Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Stackelberg-Based Optimal Profit Split Scheme in Information-Centric Wireless Networks., , , , and . ICC Workshops, page 1-6. IEEE, (2019)Service provisioning update scheme for mobile application users in a cloudlet network., and . ICC, page 1-6. IEEE, (2017)A Survey of State-of-the-Art on Blockchains: Theories, Modelings, and Tools., , , , and . CoRR, (2020)Opportunistic Offloading of Deadline-Constrained Bulk Cellular Traffic in Vehicular DTNs., , , , , and . IEEE Trans. Computers, 64 (12): 3515-3527 (2015)Efficient Certificateless Proxy Signature Scheme., , and . Int. J. Found. Comput. Sci., 27 (1): 85- (2016)Zero-Knowledge Identification Scheme Based on Symmetry Ergodic Matrices Exponentiation Problem., , and . ICCSP, page 71-75. ACM, (2017)Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem., , , and . ProvSec, volume 5324 of Lecture Notes in Computer Science, page 1-21. Springer, (2008)QoS-Aware Cooperative Computation Offloading for Robot Swarms in Cloud Robotics., , , , and . IEEE Trans. Vehicular Technology, 68 (4): 4027-4041 (2019)Deactivation-controlled epidemic routing in disruption tolerant networks with multiple sinks., , , and . GLOBECOM, page 4604-4609. IEEE, (2014)ICAT: Engine to Perform Range Analysis and Allocate Bit-Widths for Arithmetic Datapaths., , , , , , and . Journal of Circuits, Systems, and Computers, 24 (2): 1550020:1-1550020:28 (2015)