Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralized Identifier-based Privacy-preserving Authenticated Key Exchange Protocol for Electric Vehicle Charging in Smart Grid., , and . CoRR, (2022)Scalable Topologies for Time-Optimal Authentication of UAV Swarms., , , and . IEEE Netw., 36 (6): 126-132 (2022)The Internet of Vehicles (IoV) - Security, Privacy, Trust, and Reputation Management for Connected Vehicles., , , , , and . IEEE Internet Things Mag., 6 (2): 6-16 (June 2023)Power Outage Estimation and Resource Dimensioning for Solar Powered Cellular Base Stations., and . IEEE Trans. Commun., 64 (12): 5278-5289 (2016)Throughput Guarantee for Maximal Schedulers in Sensor Networks with Cooperative Relays., and . IEEE Trans. Commun., 59 (12): 3265-3271 (2011)Characterization of White Spaces in Wi-Fi Networks for Opportunistic M2M Communications., and . IEEE Trans. Commun., 64 (12): 5125-5135 (2016)A Queueing Model for Polled Service in WiMAX/IEEE 802.16 Networks., and . IEEE Trans. Commun., 60 (7): 1777-1781 (2012)Scaling of Spatial Reuse and Saturation Throughput in a Class of MAC Protocols., , and . IEEE Trans. Wirel. Commun., 6 (10): 3529-3533 (2007)An Analytical Approach to the Design of Energy Harvesting Wireless Sensor Nodes., , and . IEEE Trans. Wirel. Commun., 12 (8): 4010-4024 (2013)Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges., , and . IEEE Trans. Ind. Informatics, 19 (1): 867-869 (2023)