Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revocation games in ephemeral networks., , , and . ACM Conference on Computer and Communications Security, page 199-210. ACM, (2008)RADIANCE: Radio-Frequency Adversarial Deep-learning Inference for Automated Network Coverage Estimation., , and . GLOBECOM, page 832-837. IEEE, (2023)A cost-effective security management for clouds: A game-theoretic deception mechanism., , , and . IM, page 98-106. IEEE, (2017)A Social-Aware Approach for Federated IoT-Mobile Cloud using Matching Theory., , and . WF-IoT, page 554-559. IEEE, (2019)LIPs: A Protocol for Leadership Incentives for Heterogeneous and Dynamic Platoons., , , and . COMPSAC (1), page 535-544. IEEE, (2019)On the Age of Pseudonyms in Mobile Ad Hoc Networks., , , and . INFOCOM, page 1577-1585. IEEE, (2010)On Incentive Compatible Role-Based Reward Distribution in Algorand., , , and . DSN, page 452-463. IEEE, (2020)Cooperation in underwater sensor networks., , and . GAMENETS, page 540-548. IEEE, (2009)Peer-Assisted Information-Centric Network (PICN): A Backward Compatible Solution., , , , and . IEEE Access, (2017)Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance., , , and . WEIS, (2012)