Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Consecutive Block-Loss for Streaming Services., , , and . ICC, page 1-5. IEEE, (2010)IOTA-Based Access Control Framework for the Internet of Things., , , and . BRAINS, page 87-91. IEEE, (2020)Cost-Efficient Blockchain-Based Access Control for the Internet of Things., , , and . GLOBECOM, page 1-6. IEEE, (2021)Queueing analysis of internet-based call centers with interactive voice response and redial., , , and . CAMAD, page 373-377. IEEE, (2012)Block diffusion delay attack and its countermeasures in a Bitcoin network., , , and . Int. J. Netw. Manag., (2022)Mining Pool Selection Problem in the Presence of Block Withholding Attack., , , and . Blockchain, page 321-326. IEEE, (2020)User-search time analysis for hierarchical peer-to-peer overlay networks with time-dependent user-population process., , , and . QTNA, page 5:1-5:4. ACM, (2009)Performance analysis of data block synchronization mechanism in coolstreaming., , , and . QTNA, page 53-58. ACM, (2010)Smart Contract-Based E-Voting System Using Homomorphic Encryption and Zero-Knowledge Proof., and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 67-83. Springer, (2023)Automatic Evacuation Guiding Scheme Using Trajectories of Mobile Nodes., , , and . MobiWIS, volume 9228 of Lecture Notes in Computer Science, page 3-14. Springer, (2015)