Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cooperation in underwater sensor networks., , and . GAMENETS, page 540-548. IEEE, (2009)Peer-Assisted Information-Centric Network (PICN): A Backward Compatible Solution., , , , and . IEEE Access, (2017)Resource allocation in future HetRAT networks: a general framework., and . Wireless Networks, 26 (4): 2695-2706 (2020)On non-cooperative location privacy: a game-theoretic analysis., , , and . ACM Conference on Computer and Communications Security, page 324-337. ACM, (2009)Fostering Peer Learning With a Game-Theoretical Approach in a Blended Learning Environment., , , and . IEEE Trans. Comput. Soc. Syst., 9 (2): 571-580 (2022)Tracking Games in Mobile Networks., , , and . GameSec, volume 6442 of Lecture Notes in Computer Science, page 38-57. Springer, (2010)MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation., , , , , and . J. Netw. Syst. Manag., 31 (4): 68 (October 2023)Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance., , , and . WEIS, (2012)Performance Analysis of the IEEE 802.11 MAC and Physical Layer Protocol., , , and . WOWMOM, page 88-97. IEEE Computer Society, (2005)Outsourcing Privacy-Preserving Federated Learning on Malicious Networks through MPC., , , , and . LCN, page 1-4. IEEE, (2023)