Author of the publication

Cooperative multicast transmission strategy for energy-efficient dynamic network coding.

, and . ICC Workshops, page 479-483. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lattice-based threshold cryptography and its applications in distributed cloud computing., and . IJHPCN, 8 (2): 176-185 (2015)Cryptanalysis of JAMBU., , , and . FSE, volume 9054 of Lecture Notes in Computer Science, page 264-281. Springer, (2015)3-D Data Storage, Power Delivery, and RF/Optical Transceiver - Case Studies of 3-D Integration From System Design Perspectives., , , , and . Proc. IEEE, 97 (1): 161-174 (2009)Differential Cryptanalysis of Round-Reduced SPEEDY Family., , , and . Inscrypt, volume 13837 of Lecture Notes in Computer Science, page 272-291. Springer, (2022)Aggregate and Separate of Signatures in Wireless Network., and . AINA Workshops, page 428-433. IEEE Computer Society, (2008)Practical Threshold One-Time Proxy Signature Scheme.. AINA Workshops, page 275-279. IEEE Computer Society, (2010)Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory., , , and . ASIACRYPT (3), volume 14440 of Lecture Notes in Computer Science, page 3-33. Springer, (2023)A Generic Construction for Proxy Signature Scheme.. AICI (2), volume 7003 of Lecture Notes in Computer Science, page 93-100. Springer, (2011)Cooperative multicast transmission strategy for energy-efficient dynamic network coding., and . ICC Workshops, page 479-483. IEEE, (2013)An Embedded Rectifier-Based Built-In-Test Circuit for CMOS RF Circuits., and . ICECS, page 612-615. IEEE, (2006)