From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A bargaining approach to power control in networks of autonomous wireless entities., , и . MOBIWAC, стр. 75-82. ACM, (2010)Negotiation-Based Distributed Power Control in Wireless Networks with Autonomous Nodes., , и . VTC Spring, стр. 1-5. IEEE, (2011)Enhancing information lookup privacy through homomorphic encryption., , , , и . Secur. Commun. Networks, 7 (12): 2804-2814 (2014)A queueing theoretic approach to the delay analysis for a class of conflict resolution algorithms.. University of Toronto, Canada, (1989)Enabling Opportunistic Users in Multi-Tenant IoT Systems using Decentralized Identifiers and Permissioned Blockchains., , , и . IoT S&P@CCS, стр. 22-23. ACM, (2019)Multipoint Communication in a Beyond- 3G Internetwork., и . International Conference on Internet Computing, стр. 61-68. CSREA Press, (2002)ICN privacy and name based security., и . ICN, стр. 5-6. ACM, (2014)R?ddle: A Fully Decentralized Mobile Game for Fun and Profit., , , и . BLOCKCHAIN, том 595 из Lecture Notes in Networks and Systems, стр. 100-109. Springer, (2022)Securing Named Data Networking routing using Decentralized Identifiers., , , , и . HPSR, стр. 1-6. IEEE, (2021)Enabling self-verifiable mutable content items in IPFS using Decentralized Identifiers., , и . Networking, стр. 1-6. IEEE, (2021)