Author of the publication

Detecting and Punishing Selfish Behavior During Gossiping in Algorand Blockchain.

, , and . VCC, page 49-55. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A cost-effective security management for clouds: A game-theoretic deception mechanism., , , and . IM, page 98-106. IEEE, (2017)LIPs: A Protocol for Leadership Incentives for Heterogeneous and Dynamic Platoons., , , and . COMPSAC (1), page 535-544. IEEE, (2019)On the Age of Pseudonyms in Mobile Ad Hoc Networks., , , and . INFOCOM, page 1577-1585. IEEE, (2010)A Social-Aware Approach for Federated IoT-Mobile Cloud using Matching Theory., , and . WF-IoT, page 554-559. IEEE, (2019)Revocation games in ephemeral networks., , , and . ACM Conference on Computer and Communications Security, page 199-210. ACM, (2008)Game-Theoretic Approach to Group Learning Enhancement Through Peer-to-Peer Explanation and Competition., , , and . IEEE Access, (2018)On Incentive Compatible Role-Based Reward Distribution in Algorand., , , and . DSN, page 452-463. IEEE, (2020)RADIANCE: Radio-Frequency Adversarial Deep-learning Inference for Automated Network Coverage Estimation., , and . GLOBECOM, page 832-837. IEEE, (2023)Stochastic Coalitional Games for Cooperative Random Access in M2M Communications., , , and . IEEE Trans. Wirel. Commun., 16 (9): 6179-6192 (2017)To Trust or Not: A Security Signaling Game Between Service Provider and Client., , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 322-333. Springer, (2015)