Author of the publication

Waiting Time Minimized Charging and Discharging Strategy Based on Mobile Edge Computing Supported by Software-Defined Network.

, , , , and . IEEE Internet Things J., 7 (7): 6088-6101 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Motion Re-Estimation With Rate-Distortion Optimization for MPEG-2 to H.264/AVC Transcoding., and . IEEE Trans. Circuits Syst. Video Techn., 20 (2): 262-274 (2010)Fast block size prediction for MPEG-2 to H.264/AVC transcoding., , and . ICASSP, page 1029-1032. IEEE, (2008)On the Power of Public-key Function-Private Functional Encryption., , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 585-593. (2016)Bit-rate estimation for bit-rate reduction H.264/AVC video transcoding in wireless networks., , , and . ISWPC, page 464-467. IEEE, (2008)Making Any Identity-Based Encryption Accountable, Efficiently., and . ESORICS (1), volume 9326 of Lecture Notes in Computer Science, page 326-346. Springer, (2015)Making Public Key Functional Encryption Function Private, Distributively., and . Public Key Cryptography (2), volume 10770 of Lecture Notes in Computer Science, page 218-244. Springer, (2018)Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications., , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 548-567. Springer, (2015)Integrated transcriptomics unravels implications of glycosylation-regulating signature in diagnosis, prognosis and therapeutic benefits of hepatocellular carcinoma., , , , , and . Comput. Biol. Medicine, (2022)Security properties of two provably secure conference key agreement protocols., and . IACR Cryptol. ePrint Arch., (2005)Cryptanalysis of two identification schemes based on an ID-based cryptosystem., and . IACR Cryptol. ePrint Arch., (2005)