Author of the publication

Resource Analysis and Cost Modeling for End-to-End 5G Mobile Networks.

, , , , , , and . ONDM, volume 11616 of Lecture Notes in Computer Science, page 492-503. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approach to the formal verification of the three-principal security protocols., , and . Security and Management, page 163-169. CSREA Press, (2005)Product quality monitoring approach considering non-geometric dimensioning data with rapid production process simulation., , , and . Int. J. Prod. Res., 60 (18): 5595-5614 (2022)One secure data integrity verification scheme for cloud storage., , , , , and . Future Gener. Comput. Syst., (2019)A privacy-preserving acceleration authentication protocol for mobile pay-TV systems., and . Secur. Commun. Networks, 6 (3): 361-372 (2013)The Relationship Between Self-concept Clarity and Procrastination among College Students: A Mediation Chain Model., and . ICBDE, page 106-111. ACM, (2023)NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users., , , , and . IEEE Trans. Big Data, 8 (1): 14-24 (2022)DO-RA: Data-oriented runtime attestation for IoT devices., , , , and . Comput. Secur., (2020)Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network., , , , , and . J. Syst. Archit., (2023)Research of Security Architecture for P2P Network Based on Trust Management System., , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 184-189. Springer, (2005)Pattern-Based Personalized Workflow Fragment Discovery., , , and . SERVICES, page 106-109. IEEE, (2020)