Author of the publication

A user-centric cooperative edge caching scheme for minimizing delay in 5G content delivery networks.

, , , and . Trans. Emerg. Telecommun. Technol., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online risk-based authentication using behavioral biometrics., , , , and . Multimedia Tools Appl., 71 (2): 575-605 (2014)An RSA-Based User Authentication Scheme for Smart-Homes Using Smart Card., , and . ISDDC, volume 11317 of Lecture Notes in Computer Science, page 16-29. Springer, (2018)An Inter-device Authentication Scheme for Smart Homes Using One-Time-Password Over Infrared Channel., , and . ISDDC, volume 10618 of Lecture Notes in Computer Science, page 95-117. Springer, (2017)Data Loss Prevention Using Document Semantic Signature., , and . WIDECOM, volume 27 of Lecture Notes on Data Engineering and Communications Technologies, page 75-99. Springer, (2019)Game Theoretic Analysis of Post Handoff Target Channel Sharing in Cognitive Radio Networks., , , and . GLOBECOM, page 1-6. IEEE, (2017)Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks., , , and . GLOBECOM Workshops, page 1037-1041. IEEE, (2012)Trust management in ubiquitous computing: A Bayesian approach., , and . Comput. Commun., 34 (3): 398-406 (2011)Preventing Data Leak through Semantic Analysis., , and . Internet Things, (2021)A network communication speedup model using multiple fungible and non-fungible paths., , , , and . Internet Things, (April 2024)Double Q-learning based routing protocol for opportunistic networks., , , and . J. High Speed Networks, 29 (1): 1-14 (2023)