Author of the publication

A joint energy-saving mechanism for M2M communications in LTE-based system.

, , and . WCNC, page 4706-4711. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model., , and . Information, 6 (4): 576-591 (2015)Solutions to the anti-piracy problem in oblivious transfer., , , and . J. Comput. Syst. Sci., 82 (3): 466-476 (2016)Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud., , , , and . Trans. Comput. Collect. Intell., (2015)Server-Aided Verification Signatures with Privacy., and . EIDWT, page 414-421. IEEE Computer Society, (2013)New ID-Based Signatures without Trusted PKG., and . WKDD, page 589-593. IEEE Computer Society, (2008)A Distributed Storage Middleware Based on HBase and Redis., , and . ChineseCSCW, volume 1330 of Communications in Computer and Information Science, page 364-380. Springer, (2020)Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards., and . NSS, volume 7873 of Lecture Notes in Computer Science, page 549-562. Springer, (2013)Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme., , and . IACR Cryptology ePrint Archive, (2013)A geometric non-linear interpolatory subdivision scheme via approximation scheme., and . CAD/Graphics, page 280-285. IEEE, (2009)An improved two-step method for solving generalized Nash equilibrium problems., , , and . Eur. J. Oper. Res., 216 (3): 613-623 (2012)