Author of the publication

Incentive Mechanism Design for Heterogeneous Peer-to-Peer Networks: A Stackelberg Game Approach.

, and . CoRR, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators., , and . SEC, volume 278 of IFIP, page 47-61. Springer, (2008)Secure wireless communication platform for EV-to-Grid research., , , , and . IWCMC, page 21-25. ACM, (2010)Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes., and . Inscrypt, volume 4318 of Lecture Notes in Computer Science, page 264-278. Springer, (2006)Zero-Distortion Authentication Watermarking.. ISC, volume 2851 of Lecture Notes in Computer Science, page 325-337. Springer, (2003)A Hybrid Scheme for Authenticating Scalable Video Codestreams., , , and . IEEE Trans. Inf. Forensics Secur., 9 (4): 543-553 (2014)An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks., , and . VTC Spring, page 831-835. IEEE, (2006)Counterfeiting Attack on a Lossless Authentication Watermarking Scheme., , and . VIP, volume 22 of CRPIT, page 109-112. Australian Computer Society, (2002)A Trust Answer to Distance Query., , and . WCNC, page 2703-2708. IEEE, (2007)Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation., , , and . iThings/GreenCom/CPSCom/SmartData, page 115-122. IEEE, (2016)