Maodess Ma
#147,744
Most Influential Person Now
Maodess Ma's AcademicInfluence.com Rankings
Maodess Macomputer-science Degrees
Computer Science
#7551
World Rank
#7950
Historical Rank
Network Security
#8
World Rank
#8
Historical Rank
Database
#4598
World Rank
#4777
Historical Rank

Download Badge
Computer Science
Why Is Maodess Ma Influential?
(Suggest an Edit or Addition)Maodess Ma's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A Survey on Security Aspects for LTE and LTE-A Networks (2014) (274)
- A Survey on MAC Protocols for Underwater Wireless Sensor Networks (2014) (246)
- A strong user authentication scheme with smart cards for wireless communications (2011) (235)
- A bandwidth guaranteed polling MAC protocol for Ethernet passive optical networks (2003) (183)
- Network lifetime optimization in wireless sensor networks (2010) (107)
- A Survey on Security Aspects for 3GPP 5G Networks (2020) (105)
- A simple and robust handover authentication between HeNB and eNB in LTE networks (2012) (96)
- AOA Cooperative Position Localization (2008) (93)
- A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme (2013) (90)
- UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications (2011) (74)
- A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks (2016) (71)
- A QoS Oriented Vertical Handoff Scheme for WiMAX/WLAN Overlay Networks (2012) (71)
- DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET (2019) (68)
- Controller placement optimization in hierarchical distributed software defined vehicular networks (2018) (65)
- A survey and projection on medium access control protocols for wireless sensor networks (2012) (63)
- An novel three-party authenticated key exchange protocol using one-time key (2013) (60)
- A group-based authentication and key agreement for MTC in LTE networks (2012) (60)
- A Clock Synchronization Method for Molecular Nanomachines in Bionanosensor Networks (2016) (59)
- IPACT With Grant Estimation (IPACT-GE) Scheme for Ethernet Passive Optical Networks (2008) (58)
- Network lifetime maximization with cross-layer design in wireless sensor networks (2008) (57)
- Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks (2009) (57)
- Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network (2019) (57)
- SVM-Based Models for Predicting WLAN Traffic (2006) (55)
- Time Synchronization for Molecular Communication With Drift (2017) (55)
- Routing and QoS provisioning in cognitive radio networks (2011) (54)
- GBAAM: group-based access authentication for MTC in LTE networks (2015) (51)
- An energy-efficient and low-latency MAC protocol with Adaptive Scheduling for multi-hop wireless sensor networks (2010) (51)
- Link Stability Based Optimized Routing Framework for Software Defined Vehicular Networks (2019) (48)
- A privacy-preserving sensory data sharing scheme in Internet of Vehicles (2017) (48)
- An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks (2012) (46)
- Optimal Relay Placement in Cellular Networks (2014) (45)
- Intelligent data fusion algorithm based on hybrid delay-aware adaptive clustering in wireless sensor networks (2020) (43)
- A QoS-Based Vertical Handoff Scheme for Interworking of WLAN and WiMAX (2009) (42)
- A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks (2016) (42)
- Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System (2019) (41)
- Intrusion Prevention System for DDoS Attack on VANET With reCAPTCHA Controller Using Information Based Metrics (2019) (40)
- Offset estimation for clock synchronization in mobile molecular communication system (2016) (39)
- An ultralightweight RFID authentication protocol with CRC and permutation (2014) (38)
- Optimal Relay Node Placement and Flow Allocation in Underwater Acoustic Sensor Networks (2017) (38)
- Enhanced EAP-Based Pre-Authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks (2012) (37)
- Diffusion-Based Clock Synchronization for Molecular Communication Under Inverse Gaussian Distribution (2015) (36)
- Performance of time-difference-of-arrival ultra wideband indoor localisation (2011) (35)
- A Server Independent Authentication Scheme for RFID Systems (2012) (35)
- Cooperative angle-of-arrival position localization (2015) (34)
- Delay efficient software defined networking based architecture for vehicular networks (2016) (34)
- Comprehensive learning Jaya algorithm for parameter extraction of photovoltaic models (2020) (33)
- Scheduling Impact on the Performance of Relay-Enhanced LTE-A Networks (2016) (33)
- An Effective Electronic waste management solution based on Blockchain Smart Contract in 5G Communities (2020) (33)
- EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks (2018) (33)
- Providing deterministic quality-of-service guarantees on WDM optical networks (2000) (32)
- A filter model for intrusion detection system in Vehicle Ad Hoc Networks: A hidden Markov methodology (2019) (32)
- Secure Group Mobility Support for 6LoWPAN Networks (2018) (31)
- A secure and efficient password‐authenticated group key exchange protocol for mobile ad hoc networks (2013) (31)
- GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks (2015) (31)
- Current Technology Developments of WiMax Systems (2009) (31)
- An Energy-Efficient Self-Adaptive Duty Cycle MAC Protocol for Traffic-Dynamic Wireless Sensor Networks (2013) (30)
- A Novel Mechanism for Fast Detection of Transformed Data Leakage (2018) (28)
- Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With Blockchain (2021) (28)
- CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets (2019) (27)
- Backtracking search algorithm with competitive learning for identification of unknown parameters of photovoltaic systems (2020) (26)
- Efficient Scheduling Algorithms for Real-Time Service on WDM Optical Networks (1998) (26)
- A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination (2019) (26)
- UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks (2015) (25)
- A proxy signature-based handover authentication scheme for LTE wireless networks (2017) (25)
- Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) Verification (2020) (25)
- WiDIGR: Direction-Independent Gait Recognition System Using Commercial Wi-Fi Devices (2020) (25)
- Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet (2019) (25)
- Packet delay analysis on IEEE 802.11 DCF under finite load traffic in multi-hop ad hoc networks (2008) (24)
- A VoIP Traffic Identification Scheme Based on Host and Flow Behavior Analysis (2011) (23)
- Adaptive fuzzy multiple attribute decision routing in VANETs (2017) (23)
- Balance-Based SDN Controller Placement and Assignment with Minimum Weight Matching (2018) (23)
- G2RHA:Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks (2017) (23)
- An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors (2012) (23)
- Exploiting sink movement for energy-efficient load-balancing in wireless sensor networks (2008) (22)
- An Opportunistic Service Differentiation Routing Protocol for Cognitive Radio Networks (2010) (22)
- A cross-layer elastic CAC and holistic opportunistic scheduling for QoS support in WiMAX (2010) (21)
- Adaptive scheduling for differentiated services in an Ethernet passive optical network (2005) (21)
- Position estimation using ultra-wideband time difference of arrival measurements (2008) (21)
- Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method (2013) (21)
- Cross-layer QoS support framework and holistic opportunistic scheduling for QoS in single carrier WiMAX system (2011) (20)
- An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks (2018) (20)
- Integration of WLAN and WiMAX with base station assisted QoS (2008) (20)
- Connecting sensor networks with IP using a Configurable tiny TCP/IP protocol stack (2007) (20)
- A unified grid-based wandering pattern detection algorithm (2016) (20)
- A Link Adaptation Algorithm in MIMO-based WiMAX Systems (2007) (19)
- A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks (2020) (19)
- Modeling location management in wireless networks with generally distributed parameters (2006) (19)
- Multi-access edge computing enabled internet of things: advances and novel applications (2020) (19)
- Theil-Based Countermeasure against Interest Flooding Attacks for Named Data Networks (2019) (19)
- Access Control in Cloud Computing (2015) (19)
- Synchronization of Bio-Nanomachines Based on Molecular Diffusion (2016) (18)
- Blockchain-based mobility management for 5G (2020) (18)
- Supporting Differentiated Services with Fairness by an Urgency Fair Queuing Scheduling Scheme in EPONs (2006) (18)
- A dynamic-encryption authentication scheme for M2M security in cyber-physical systems (2013) (18)
- An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems (2016) (18)
- A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems (2013) (18)
- Theoretical Lower Bound for UWB TDOA Positioning (2007) (18)
- An Efficient Message Scheduling Algorithm for WDM Lightwave Networks (1999) (18)
- Supporting Differentiated Services in Wireless Access Networks (2006) (17)
- A utility-based joint power and rate adaptive algorithm in wireless ad hoc networks (2009) (17)
- Research on Detection and Defense Mechanisms of DoS Attacks Based on BP Neural Network and Game Theory (2019) (17)
- Queue based scheduling for IEEE 802.16 wireless broadband (2007) (17)
- A novel multiple access scheme for Ethernet passive optical networks (2003) (17)
- Design of parameter tunable robust controller for active queue management based on H∞ control theory (2011) (17)
- Improving Quality of Experience in multimedia Internet of Things leveraging machine learning on big data (2018) (17)
- Relays-enhanced LTE-Advanced networks performance studies (2011) (16)
- Backup Routing for Multimedia Transmissions over Mesh Networks (2007) (16)
- Investigation of a large-scale P2P VoD overlay network by measurements (2012) (16)
- $\text{E}^{3}$ MC: Improving Energy Efficiency via Elastic Multi-Controller SDN in Data Center Networks (2016) (16)
- A Location-Aware fast handover scheme for mobile WiMax networks (2009) (16)
- Security improvements of IEEE 802.11i 4-way handshake scheme (2010) (16)
- An authentication and key establishment scheme to enhance security for M2M in 6LoWPANs (2015) (15)
- WSN02-5: A Power-Controlled Rate-Adaptive MAC Protocol to Support Differentiated Service in Wireless Ad Hoc Networks (2006) (15)
- A Group Neighborhood Average Clock Synchronization Protocol for Wireless Sensor Networks (2014) (15)
- Wireless broadband access: WiMAX and beyond (2007) (15)
- Multi-Population Ant Colony Algorithm for Virtual Machine Deployment (2017) (15)
- Intelligent MAC model for traffic scheduling in IEEE 802.11e wireless LANs (2008) (15)
- Edge sensing data-imaging conversion scheme of load forecasting in smart grid (2020) (15)
- QoS-aware cooperative medium access control for MIMO ad-hoc networks (2010) (15)
- Concentration-based demodulation scheme for mobile receiver in molecular communication (2019) (14)
- IPACT with Grant Estimation for EPON (2006) (14)
- Proactive load balancing with admission control for heterogeneous overlay networks (2013) (14)
- Hierarchical scheduling framework for QoS service in WiMAX point-to-multi-point networks (2010) (14)
- Novel Frequency-Domain Oversampling Receiver for CP MC-CDMA Systems (2015) (14)
- Achieve Location Privacy-Preserving Range Query in Vehicular Sensing (2017) (14)
- Link Dynamics Based Packet Routing Framework for Software Defined Vehicular Networks (2017) (14)
- A Novel Efficient Address Mutation Scheme for IPv6 Networks (2017) (14)
- Performance benchmarking for wireless body area networks at 2.4 GHz (2011) (13)
- A fast clustering algorithm based on grid and density (2005) (13)
- An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems (2017) (13)
- Connectivity aware tribrid routing framework for a generalized software defined vehicular network (2019) (13)
- An Overview of Machine Learning-Based Energy-Efficient Routing Algorithms in Wireless Sensor Networks (2021) (13)
- Next generation optical access network (2006) (13)
- Secure RFID Authentication Schemes Based on Security Analysis and Improvements of the USI Protocol (2019) (13)
- A Batch Authentication Protocol for V2G Communications (2011) (13)
- Fast and efficient physical layer authentication for 5G HetNet handover (2017) (12)
- Wireless Quality of Service: Techniques, Standards, and Applications (2008) (12)
- A Secure and Efficient Message Authentication Scheme for Vehicular Networks based on LTE-V (2018) (12)
- A Novel Receiver Design for HACO-OFDM by Time-Domain Clipping Noise Elimination (2018) (12)
- Network selection and resource allocation for multicast in HetNets (2014) (12)
- Game-Theory-Based Clustering Scheme for Energy Balancing in Underwater Acoustic Sensor Networks (2021) (12)
- Supporting Real-Time Service in Packet-Switched Wireless Networks (2006) (12)
- LPPA: Lightweight privacy‐preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks (2018) (12)
- Secure and Efficient Vertical Handover Authentication for 5G HetNets (2018) (12)
- An energy-efficient MAC protocol with Adaptive Scheduling for wireless sensor networks (2009) (12)
- UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks (2018) (11)
- An Efficient Handover Authentication Mechanism for 5G Wireless Network (2019) (11)
- A Novel way for Handover in Maritime WiMAX Mesh Network (2007) (11)
- Group mobility support in mobile WiMAX networks (2011) (10)
- Utility-Optimized Flow-Level Bandwidth Allocation in Hybrid SDNs (2018) (10)
- Parameter estimation of inverse Gaussian channel for diffusion-based molecular communication (2016) (10)
- Soft Computing and Medical Bioinformatics (2018) (10)
- A non‐biased trust model for wireless mesh networks (2017) (10)
- Quality of service provisioning in worldwide interoperability for microwave access networks based on cooperative game theory (2011) (10)
- Hierarchical scheduling to support differentiated services in Ethernet passive optical networks (2006) (10)
- QoS guaranteed resource block allocation algorithm in LTE downlink (2012) (10)
- Achieving Faster Handovers in Mobile WiMAX Networks (2012) (10)
- QoS provisioning by power control for video communication via satellite links (2015) (10)
- A Hybrid Authentication Protocol for LTE/LTE-A Network (2019) (9)
- A systematic scheme for multiple access in ethernet passive optical access networks (2005) (9)
- Cognitive-inspired Computing: Advances and Novel Applications (2020) (9)
- An adaptive scheduling algorithm for differentiated services on WDM optical networks (2001) (9)
- Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination (2018) (9)
- An efficient scheduling algorithm for real-time traffic on WDM passive star optical networks (2005) (9)
- A performance model for differentiated service over single-hop passive star coupled WDM optical networks (2011) (9)
- Periodic $K$ -Times Anonymous Authentication With Efficient Revocation of Violator’s Credential (2015) (9)
- QoS scheduling for group mobility in WiMAX (2008) (9)
- Near-Optimal Cross-Layer Forward Error Correction Using Raptor and RCPC Codes for Prioritized Video Transmission Over Wireless Channels (2017) (9)
- Advanced Perceptive Forwarding in Content-Centric Networks (2017) (9)
- CCS-DTN: Efficient routing in social DTNs based on clustering and network coding (2013) (9)
- An Analysis of K-Connectivity in Shadowing and Nakagami Fading Wireless Multi-Hop Networks (2008) (9)
- Collaborative Wireless Sensor Networks and Applications (2015) (8)
- Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm (2017) (8)
- Routing in taxi and public transport based heterogeneous vehicular networks (2016) (8)
- ECF-MRS: An Efficient and Collaborative Framework With Markov-Based Reputation Scheme for IDSs in Vehicular Networks (2021) (8)
- A cost-based scheduling algorithm for differentiated service on WDM optical networks (2003) (8)
- EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet (2020) (8)
- Priority and Maximum Revenue based Routing and Wavelength Assignment for All-optical WDM Networks (2007) (8)
- The Influence of MAC Protocol on a Non-Synchronous Localization Scheme in Large-Scale UWSNs (2018) (8)
- A Weighted Context Graph Model for Fast Data Leak Detection (2018) (8)
- BAVPM: Practical Autonomous Vehicle Platoon Management Supported by Blockchain Technique (2019) (8)
- An enhanced authentication protocol for WRANs in TV white space (2015) (8)
- Data Forwarding Scheme for Vehicle Tracking in Named Data Networking (2021) (8)
- Overview of rate adaptation algorithms based on MIMO technology in WiMAX networks (2007) (8)
- Delay guaranteed MDP scheduling scheme for HCCA based on 802.11p protocol in V2R environments (2017) (8)
- BEHT: Blockchain-Based Efficient Highway Toll Paradigm for Opportunistic Autonomous Vehicle Platoon (2020) (8)
- A three-tier framework and scheduling to support QoS service in WiMAX (2007) (8)
- Delay Tolerant Networking (2012) (8)
- Fuzzy Multiple Attribute Decision Routing in VANETs (2014) (8)
- VoIP Traffic Identification Based on Host and Flow Behavior Analysis (2010) (7)
- Network Lifetime Optimization by Duality Approach for Multi-Source and Single-Sink Topology in Wireless Sensor Networks (2007) (7)
- An Authentication Framework for Multi-Domain Machine-to-Machine Communication in Cyber-Physical Systems (2015) (7)
- Scalable Rekeying Algorithm in IEEE 802.16e (2011) (7)
- Co-Maintained Database Based on Blockchain for IDSs: A Lifetime Learning Framework (2021) (7)
- A Framework of Real-time Wandering Management for Person with Dementia (2017) (7)
- A Low-Cost RFID Authentication Protocol Against Desynchronization with a Random Tuple (2014) (7)
- Secure and Efficient Localization Scheme in Ultra-Wideband Sensor Networks (2009) (7)
- Distributed Power Saving for Large-Scale Software-Defined Data Center Networks (2018) (7)
- Isolation Forest-Based Mechanism to Defend against Interest Flooding Attacks in Named Data Networking (2021) (7)
- Call Completion in Wireless Networks Over Lossy Link (2007) (7)
- A Lightweight Secure VANET-Based Navigation System (2014) (7)
- A lightweight and secure handover authentication scheme for 5G network using neighbour base stations (2021) (7)
- Efficient Flow Instantiation via Source Routing in Software Defined Vehicular Networks (2017) (7)
- Current research progress of optical networks (2009) (7)
- DTLShps: SDN-Based DTLS Handshake Protocol Simplification for IoT (2020) (7)
- DC and CoMP Authentication in LTE-Advanced 5G HetNet (2017) (7)
- Study of Constellation Design of Pseudolites Based on Improved Adaptive Genetic Algorithm (2016) (7)
- Markovian model based indoor location tracking for Internet of Things (IoT) applications (2017) (7)
- A Queue Based Scheduling Approach for WMAN with Adaptive Augmentation (2008) (7)
- An Efficient Three-Party Authenticated Key Exchange Protocol with One-Time Key (2010) (7)
- Minimum Connected Dominating Set Algorithms for Ad Hoc Sensor Networks (2019) (7)
- Security enhancements in WiMAX mesh networks (2011) (7)
- A cross-layer selfishness Avoidance Routing Protocol for the dynamic Cognitive Radio Networks (2011) (6)
- A cross-domain group authentication scheme for LTE-A based vehicular network (2017) (6)
- Fog-Based Pub/Sub Index With Boolean Expressions in the Internet of Industrial Vehicles (2019) (6)
- Access Authentication of Mass Device Connections for MTC in LTE Networks (2014) (6)
- Resource Matching in Carrier Aggregation Enabling 5G Networks (2017) (6)
- A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks (2022) (6)
- GAKAV: Group Authentication and Key Agreement for LTE/LTE-A Vehicular Networks (2017) (6)
- Maximum-Likelihood Estimator of Clock Offset between Nanomachines in Bionanosensor Networks (2015) (6)
- A novel authenticated encryption scheme with convertibility (2013) (6)
- An urgency fair queuing scheduling to support differentiated services in EPONs (2005) (6)
- Link Stability Based Hybrid Routing Protocol for Software Defined Vehicular Networks (2018) (6)
- Uplink Energy-Delay Trade-Off under Optimized Relay Placement in Cellular Networks (2015) (6)
- Trend Analysis in the Trajectory of the Dementia Patients (2017) (6)
- A heuristic adaptive QoS prediction scheme in single-hop passive star coupled WDM optical networks (2011) (6)
- A Unified Security Framework for Multi-domain Wireless Mesh Networks (2011) (6)
- A Privacy-preserving and Cross-domain Group Authentication Scheme for Vehicular in LTE-A Networks (2017) (6)
- Securing wireless mesh networks in a unified security framework with corruption-resilience (2012) (6)
- A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks (2019) (6)
- A security enhanced authentication and key distribution protocol for wireless networks (2010) (6)
- FKR: An efficient authentication scheme for IEEE 802.11ah networks (2020) (5)
- A MAC-Layer QoS Provisioning Protocol for Cognitive Radio Networks (2012) (5)
- SNR Improvement for Energy Detection of Narrow Band Signal in OFDM System (2014) (5)
- WLAN Traffic Prediction Using Support Vector Machine (2009) (5)
- A cognitive Power-Controlled Rate-Adaptive MAC protocol to support differentiated service in wireless mesh networks (2009) (5)
- MAC Protocols for WDM Networks — Survey and Summary (2002) (5)
- Radio Resource Management by Evolutionary Algorithms for 4G LTE-Advanced Networks (2015) (5)
- Security enhancements on Home Area Networks in smart grids (2016) (5)
- Optimal Scheduling for Minimum Delay in Passive Star Coupled WDM Optical Networks (2008) (5)
- Scalable and efficient key management for Mobile WiMAX networks (2014) (5)
- Real-time cooperative data routing and scheduling in software defined vehicular networks (2021) (5)
- Traffic Prediction over Wireless Networks (2010) (5)
- Design of a novel dynamic trust model for spectrum management in WRANs of TV white space (2017) (5)
- An Efficient QoS Prediction Scheme in Single-Hop Passive Star Coupled WDM Optical Networks (2007) (5)
- Wireless Broadband Access: WiMAX and Beyond [Guest Editorial] (2007) (5)
- An Efficient EAP-Based Pre-Authentication for Inter-WRAN Handover in TV White Space (2017) (5)
- An Efficient Secure Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN in Unattended Scenarios (2020) (5)
- Message scheduling in WDM optical networks with reduced transmitter tuning overhead (2004) (5)
- Message scheduling in WDM optical networks with reduced transmitter tuning overhead (2005) (5)
- Offset and Skew Estimation for Clock Synchronization in Molecular Communication Systems (2016) (5)
- HASVC: An Efficient Hybrid Authentication Scheme for Vehicular Communication (2011) (5)
- A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks (2021) (5)
- Early Warning Scheme of COVID-19 related Internet Public Opinion based on RVM-L Model (2021) (5)
- SIR Estimation in Hexagonal Cellular Networks with Best Server Policy (2013) (5)
- Cross-Layer MAC Protocol and Holistic Opportunistic Scheduling with Adaptive Power Control for QoS in WiMAX (2011) (5)
- An pre-authentication protocol with symmetric keys for secure handover in mobile WiMAX networks (2012) (5)
- Supporting real-time service in Bluetooth networks (2005) (5)
- CCS-DTN: Clustering and Network Coding-Based Efficient Routing in Social DTNs (2014) (4)
- Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks (2019) (4)
- Unified handover authentication between heterogeneous access systems in LTE networks (2012) (4)
- Secure and efficient scheme for fast initial link setup against key reinstallation attacks in IEEE 802.11ah networks (2019) (4)
- A Special Section in IEEE Access: Cooperative and Intelligent Sensing (2017) (4)
- An improved transport algorithm over DCCP in wireless ad hoc networks (2014) (4)
- Network Lifetime Optimization by KKT Optimality Conditions in Wireless Sensor Networks (2009) (4)
- Providing guaranteed deterministic performance service to multimedia applications on WDM optical networks (2000) (4)
- Bitstream-Oriented Protection for the H.264/Scalable Video Coding (SVC) (2017) (4)
- Migration to software-defined networks: The customers' view (2017) (4)
- Analytical and simulation studies for Call Admission and resource allocation schemes proposed for WiMAX system (2010) (4)
- ATCFS: Effective Connectivity Restoration Scheme for Underwater Acoustic Sensor Networks (2019) (4)
- Scalable protection scheme for the H.264/SVC video streaming (2017) (4)
- FS-MOEA: A Novel Feature Selection Algorithm for IDSs in Vehicular Networks (2022) (4)
- A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks (2021) (4)
- GaDQN-IDS: A Novel Self-Adaptive IDS for VANETs Based on Bayesian Game Theory and Deep Reinforcement Learning (2022) (4)
- A Sustainable Marriage of Telcos and Transp in the Era of Big Data: Are We Ready? (2018) (4)
- A PMIPv6-Based Secured Mobility Scheme for 6LoWPAN (2016) (4)
- Cooperative Data Routing & Scheduling In Software Defined Vehicular Networks (2018) (4)
- A reliable route selecting algorithm for vehicle communication (2009) (4)
- An efficient solution for mitigating light-load penalty in EPONs (2006) (4)
- An enhanced handover authentication solution for 6LoWPAN networks (2021) (4)
- A systematic scheme for guaranteed deterministic performance service on WDM optical networks (2000) (4)
- Adaptive scheduling for integrated traffic on WDM optical networks (2004) (4)
- Cross-layer concurrent transmission scheduling in WiMAX mesh networks (2010) (4)
- Blockchain-Based Mobility Management for LTE and Beyond (2019) (4)
- Adaptive scheduling for differentiated services in the ethernet passive optical networks (2004) (4)
- Scheduling algorithm for differentiated service on wavelength-division-multiplexed passive optical access networks (2002) (4)
- Fast Handover Schemes in IEEE 802.16E Broadband Wireless Access System (2009) (4)
- A Privacy-Preserving Proximity Testing for Location-Based Services (2018) (4)
- A Load Balance Mechanism in Heterogeneous Network Based on Utility Function (2016) (4)
- A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks (2022) (4)
- Achieving Secure CoMP Joint Transmission Handover in LTE-A Vehicular Networks (2017) (4)
- A Reputation-Based Leader Election Scheme for Opportunistic Autonomous Vehicle Platoon (2022) (4)
- NSEHA: A Neighbor-based Secure and Efficient Handover Authentication Mechanism for 5G Networks (2021) (3)
- Task Scheduling by Neural Network with Mean Field Annealing Improvement in Grid Computing (2006) (3)
- Cryptanalysis of some conference schemes for mobile communications (2012) (3)
- Utility-Based Network Bandwidth Allocation in the Hybrid SDNs (2017) (3)
- Cluster Routing-Based Data Packet Backhaul Prediction Method in Vehicular Named Data Networking (2021) (3)
- Securing 5G HetNets Using Mutual Physical Layer Authentication (2019) (3)
- Distributed composition services for self-adaptation wireless sensor networks (2013) (3)
- A Cross-Layer Cognitive Radio-Based Framework and CAC Scheme in WiMAX Networks (2013) (3)
- QoS Provision Mechanisms in WiMax (2009) (3)
- Optimal Relay Node Placement for Connectivity Recovery in Underwater Acoustic Sensor Networks (2018) (3)
- DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System (2019) (3)
- Understanding link-level characterization of long-distance 802.11g semi-urban links (2011) (3)
- A scheduling algorithm with minimum message loss rate in WDM optical networks (2007) (3)
- Utility-based scheduling in wireless multi-hop networks over non-deterministic fading channels (2012) (3)
- Pareto efficient resource matching for LTE-A system (2015) (3)
- A Utility-Based Joint Power and Rate Adaptive Algorithm for Wireless Ad Hoc Networks (2007) (3)
- Adaptive Rate Selection Scheme Based on Intelligent Learning Algorithm in Wireless LANs (2007) (3)
- FARIMA model based admission control to support QoS service in the networks with WiFi access (2005) (3)
- Cognitive radio-based framework and self-optimizing temporal-spectrum block scheduling for QoS provisioning in WiMAX (2011) (3)
- EBTCOR: an Energy-Balanced 3D Topology Control Algorithm Based on Optimally Rigid Graph in UWSNs (2018) (3)
- Hierarchical Identity-Based Security Mechanism Using Blockchain in Named Data Networking (2020) (3)
- Performance of Adaptive Scheduling MAC (AS-MAC) protocol with different AS-period in multi-hop networks (2011) (3)
- Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks (2017) (3)
- Differentiated service provisioning in the MAC layer of cognitive radio mesh networks (2012) (3)
- Adaptive polling interval scheduling to support real-time service in Bluetooth networks (2006) (3)
- Providing Real-Time Service in CDMA Wireless Networks (2007) (3)
- An efficient scheduling algorithm for real-time traffic on WDm optical networks (2004) (3)
- Efficient scheduling with reduced message delay for passive star coupled WDM optical networks (2005) (3)
- Fluid-Based Modeling of TCP Veno (2008) (2)
- Cross-layer resource scheduling scheme in WiMAX mesh networks (2012) (2)
- CETVSP: Cost Efficient Trust-Based Vehicle Selection for Platoon (2019) (2)
- An efficient multiple access control scheme to support differentiated services in EPONS (2004) (2)
- An efficient authentication framework over heterogeneous vehicular networks (2016) (2)
- Storage and access optimization scheme based on correlation probabilities in the internet of vehicles (2020) (2)
- An Attribute-Based Access Control Mechanism for Blockchain-Enabled Internet of Vehicles (2020) (2)
- Secure Public Key Regime (SPKR) in vehicular networks (2015) (2)
- A Multiple Access Scheme for Power-Controlled Rate-Adaptive Mobile Ad Hoc Networks (2006) (2)
- Security Issues and Approaches in M2M Communications (2015) (2)
- Resource management for symmetrical applications over heterogeneous services in IEEE 802.16 (2017) (2)
- QoS Support Mechanisms in WiMAX (2010) (2)
- A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme (2012) (2)
- TR-SDTN: Trust based efficient routing in hostile social DTNs (2015) (2)
- A collusion-resilient self-healing key distribution scheme for wireless sensor networks (2012) (2)
- TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs (2015) (2)
- Perceptive Forwarding Strategy in Content-Centric Network (2015) (2)
- Design and Development of Smart Home Sensing Supported by Blockchain Technology (2019) (2)
- Evaluation of Molecular Oscillation for Nanonetworks Based on Quorum Sensing (2015) (2)
- A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks (2016) (2)
- Compact E-Cash with Efficient Coin-Tracing (2018) (2)
- Scheduling and congestion control for fair bandwidth allocation in wireless LANs (2009) (2)
- Protecting Satellite Systems from Disassociation DoS Attacks (2013) (2)
- Reference broadcast synchronization scheme for nanomachines (2016) (2)
- A case study of obsolete part procurement process reengineering (2007) (2)
- Achievable rate for a mobile molecular communication system invited paper (2017) (2)
- Performance improvements of HCCA scheduling in V2R environments (2015) (2)
- A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks (2017) (2)
- Protecting satellite networks from disassociation DoS attacks (2010) (2)
- IN ETHERNET PASSIVE OPTICAL NETWORKS (2004) (2)
- Performance and Security Enhancements to Fast Initial Link Setup in IEEE 802.11ah Wireless Networks (2018) (2)
- A FeedForward-Convolutional Neural Network to Detect Low-Rate DoS in IoT (2022) (2)
- Design of a Hybrid Digital Watermarking Algorithm with High Robustness (2020) (2)
- A secure PMIPv6-based group mobility scheme for 6L0WPAN networks (2017) (2)
- A Fault-tolerant Strategy for Real-time Task Scheduling on Multiprocessor System (1996) (2)
- Differentiated services supported by bandwidth guarantee polling (BGP) scheme in ethernet passive optical networks (2004) (2)
- Scheduling transmission of multimedia video traffic on optical access networks (2004) (2)
- A blockchain-enabled 5G authentication scheme against DoS attacks (2021) (2)
- Performance measurements for symmetrical services in wireless networks (2014) (2)
- A Secure Authentication Protocol with Performance Enhancements for 4G LTE/LTE-A Wireless Networks (2021) (2)
- OIDPR: Optimized insulin dosage via privacy‐preserving reinforcement learning (2020) (2)
- A KRC encryption solution protecting IEEE 802.11I 4-way handshake from DoS attacks (2011) (2)
- A LSTM-Based Channel Fingerprinting Method for Intrusion Detection (2021) (1)
- A Blockchain-Based Security Scheme for Vehicular Ad Hoc Networks in Smart Cities (2021) (1)
- Architectures of the Interworking of 3G Cellular Networks and Wireless LANs (2009) (1)
- A blockchain-based authentication scheme for the machine-to-machine communication of a cyber physical system (2021) (1)
- QoS Support in the Cognitive Radio Networks (2013) (1)
- A novel authenticated multi-party key agreement for private cloud (2014) (1)
- A SPC-Based Adaptive RTO Algorithm (2011) (1)
- Security enhancement for dynamic key refreshment in neighborhood area network of smart grid (2016) (1)
- A dynamic bandwidth allocation scheme for EPON (2008) (1)
- A geometrical approach for power optimization in relay-based cellular networks (2014) (1)
- Privacy-Preserving Fine-Grained Outsourcing PHR with Efficient Policy Updating (2019) (1)
- An Efficient EAP-Based Pre-Authentication Scheme for Handovers in WRANs over TVWS (2017) (1)
- An efficient scheduling algorithm with reduced message delay for WDM optical networks (2004) (1)
- A Certificateless Efficient and Secure Group Handover Authentication Protocol in 5G Enabled Vehicular Networks (2022) (1)
- Resource allocation scheme for HetNets with CoMP joint transmission (2017) (1)
- Overview of MAC Protocols for EPONs (2009) (1)
- Providing differentiated services in CDMA wireless networks (2008) (1)
- Active Computing Toward 5G Internet of Things (2022) (1)
- An efficient scheduling scheme for DQRUMA to support real-time traffic in wireless packet-switched networks (2003) (1)
- Traffic Analysis of P2P IPTV and Comparison with BT-Like Application Based on Live Measurement (2009) (1)
- A fluid approach for performance analysis of LTE-A networks with relays (2013) (1)
- A cross-layer MAC protocol and an opportunistic scheduling with APC for QoS support in WiMAX (2009) (1)
- Secure D2D in 5G Cellular Networks: Architecture, Requirements and Solutions (2022) (1)
- QoS-aware load-balancing algorithm for heterogeneous wireless networks (2013) (1)
- An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking (2022) (1)
- Combining scheduling and congestion control for fair resource allocation in WLAN: Combining scheduling and congestion control for fair resource allocation in WLAN (2009) (1)
- Efficient message scheduling for WDM optical networks with minimizing flow time (2004) (1)
- Experimental evaluation of an adaptive PI rate controller for congestion control (2008) (1)
- Priority-Queue based Dynamic Scaling for Efficient Resource Allocation in Fog Computing (2021) (1)
- Security Issues in Machine-to-Machine Communication (2014) (1)
- Bac-Crl: Blockchain-Assisted Coded Caching Certificate Revocation List for Authentication in Vanets (2022) (1)
- Investigation of a large-scale P2P VoD overlay network by measurements (2012) (1)
- A Fast and Secure Uniform Handover Authentication Scheme for 5G HetNets (2020) (1)
- Agent Driven Ubiquitous Mobility (2006) (1)
- Providing delay guaranteed service in CDMA wireless networks (2008) (1)
- Research on Ultra-Lightweight RFID Mutual Authentication Protocol Based on Stream Cipher (2021) (1)
- Provable secure protected designated proxy signature with revocation (2015) (1)
- Efficient Deployment of Base Stations in Wireless Communication Networks (2016) (1)
- Elastic bandwidth allocation scheme with softened peak interference power constraint for the dynamic cognitive radio systems (2016) (1)
- RFID security protocol trace attack and desynchronizing attack deep research (2011) (1)
- Resource Management and QoS Provisioning for Duplex Services in IEEE 802.16 (2014) (1)
- Network lifetime global optimization for multi-source and single-sink topology in wireless sensor networks (2009) (1)
- Structure of Named Data Networks and Security Issues (2021) (1)
- Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning (2019) (1)
- Secure and Efficient Fast Initial Link Setup Scheme Design (2019) (1)
- Iterative frequency-domain fractionally spaced receiver for zero-padded multi-carrier code division multiple access systems (2014) (1)
- Joint Concurrent Routing and Multi-Pointer Packet Scheduling in IEEE 802.16 Mesh Networks (2016) (1)
- MAC Protocols for Star - Survey and Summary (2000) (1)
- TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks (2014) (1)
- Ieee Access Special Section Editorial: Human-Driven Edge Computing (2021) (1)
- TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT (2019) (1)
- An Efficiency-Accuracy Tradeoff for IDSs in VANETs with Markov-based Reputation Scheme (2021) (1)
- Low Rate DoS Attack Detection in IoT - SDN using Deep Learning (2021) (1)
- A Novel and Efficient Anonymous Authentication Scheme Based on Extended Chebyshev Chaotic Maps for Smart Grid (2022) (0)
- Enhanced security functionality for communication networks in smart grid systems (2017) (0)
- Efficient scheduling with minimum tuning latency for WDM optical networks (2008) (0)
- Oscillation of Nanomachines Based on Molecular Diffusion With Noises (2017) (0)
- Best Readings in Communications and Information Systems Security (2013) (0)
- A performance model for differentiated service over WDM optical networks (2008) (0)
- Implementation of low power multi-hop wireless sensor network (2016) (0)
- Information-Theoretic Ensemble Learning for DDoS Detection with Adaptive Boosting (2019) (0)
- An efficient and secured multi-server authentication scheme (2011) (0)
- Tutorial 3: WiMax Systems and Mesh Networks (2006) (0)
- Temporary Internet Access for Authentication and Key Agreement for LTE Networks (2018) (0)
- A Novel Energy Efficient Key Distribution Scheme for Mobile WiMAX Networks (2017) (0)
- Privacy-preserving Intelligent Traffic Light Control (2020) (0)
- Matrix-tree based hybrid broadcast encryption (2011) (0)
- Simulation on a fault tolerant multiprocessor system (1997) (0)
- A Low-Cost RFID Authentication Protocol Against Desynchronization with a Random Tuple (2014) (0)
- Cross-Layer Self-Optimizing Temporal-Spectrum Block Scheduling for QoS Provisioning in WiMAX (2010) (0)
- A semi fragile watermarking algorithm based on compressed sensing applied for audio tampering detection and recovery (2022) (0)
- Secure delegation of services through proxy signature with revocation (2016) (0)
- Modeling and analysis on double-tiered device-to-device communications in vehicle networks (2018) (0)
- Study of effect of timeout settings on energy saving of lighting systems using queuing model (2011) (0)
- Design and analysis of a low cost multiple-secret-key RFID security protocol (2011) (0)
- Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, ICTCE 2017, Osaka, Japan, October 22 - 24, 2017 (2017) (0)
- Resource Management and QoS Provisioning for Duplex Services in IEEE 802.16 (2014) (0)
- SIR Estimation in Hexagonal Cellular Networks with Best Server Policy (2012) (0)
- Joint Concurrent Routing and Multi-Pointer Packet Scheduling in IEEE 802.16 Mesh Networks (2016) (0)
- Enhancing TCP Performance and Connectivity in Ad Hoc Networks (2012) (0)
- Proceedings of the 2nd International Conference on Communication and Information Processing (2016) (0)
- Utility-Based Scheduling with Non-Deterministic Fading Channels in Wireless Multi-Hop Networks (2009) (0)
- MetaVSID: A Robust Meta-Reinforced Learning Approach for VSI-DDoS Detection on the Edge (2022) (0)
- Protecting Satellite Systems from Disassociation DoS Attacks (2012) (0)
- Medium Access Control in Wireless Ad Hoc Networks (2006) (0)
- Topology investigation of a large-scale P2P VoD overlay network based on active measurement (2010) (0)
- Selection of the optimal embedding positions of digital audio watermarking in wavelet domain (2020) (0)
- Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter (2022) (0)
- Security Issues of Communication Networks in Smart Grid (2017) (0)
- A Bio-Inspired and User-Experience Preferred Load-Balance Algorithm for Heterogeneous Networks (2018) (0)
- A Remote Healthcare System Supported by Heterogeneous Wireless Networks (2011) (0)
- Design of a Heterogeneous Wireless Network-based Remote Healthcare System (2011) (0)
- Two-stage frequency-domain oversampling receivers for cyclic prefix orthogonal frequency-division multiplexing systems (2016) (0)
- IEEE Access Special Section Editorial: Urban Computing and Intelligence (2021) (0)
- MAC Protocols for Single-Hop Passive-Star Coupled WDM Optical Networks (2009) (0)
- A Novel Energy Efficient Key Distribution Scheme for Mobile WiMAX Networks (2016) (0)
- Transmission of 16-QAM OFDM Signal with Secure Strategy Technique in DD-OOFDM Systems (2014) (0)
- Binary Tree-Based Interest Flooding Attack Detection and Mitigation in NDNs (2021) (0)
- Resource management for symmetrical applications over heterogeneous services in IEEE 802.16 (2016) (0)
- A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems (2012) (0)
- GUEST EDITORIAL - WIRELESS BROADBAND ACCESS: WIMAX AND BEYOND (2007) (0)
- Scheduling Transmission of Multimedia Video Traffic on WDM Passive Optical Access Networks (2009) (0)
- Security for Handover and D2D Communication in 5G HetNets (2020) (0)
- An analysis and implementation study on a robust congestion controller for the internet (2008) (0)
- Dynamic Model-Based Optimization of Relay-Enhanced Cellular Networks (2012) (0)
- I2NS2011 Organizing Committee (2011) (0)
- Ubiquitous Mobility in Next Generation Networks (2006) (0)
- A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks (2015) (0)
- Proceedings of the 3rd International Conference on Education and Multimedia Technology (2017) (0)
- A Cross-Layer Cognitive Radio-Based Framework and CAC Scheme in WiMAX Networks (2012) (0)
- Federated Deep Reinforcement Learning-Based Spectrum Access Algorithm With Warranty Contract in Intelligent Transportation Systems (2023) (0)
- Elastic bandwidth allocation scheme with softened peak interference power constraint for the dynamic cognitive radio systems (2015) (0)
- Secure Transmission of 2.5 Gb sec-1 16-QAM OFDM Signal with LDPC Coding in DD-OOFDM Systems (2014) (0)
- Multimedia Medium Access Control Protocols for WDM Optical Networks (2003) (0)
- Providing Integrated Service in CDMA Wireless Networks (2005) (0)
- Hybrid multimedia broadcast encryption schemes (2012) (0)
- An efficient EAP‐based proxy signature handover authentication scheme for WRANs over TV white space (2017) (0)
- H‐LCFST: a hash lowest cost first search tree for flexible packet classification (2016) (0)
- Dementia PEAR : An approach for Person-Centred Care of Dementia Patients (2018) (0)
- Security enhancement of the communication-efficient AUTHMAC_DH protocols (2012) (0)
- MAC design for Ethernet passive optical networks (2002) (0)
- A Rehearsal-Assisted Distributed MAC Protocol for TDD-CDMA Based Multihop Networks (2007) (0)
- Privacy Preserving for Location-Based IoT Services (2018) (0)
- A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets (2020) (0)
- Dynamic admission control in hybrid QoS networks with WiFi access (2006) (0)
- A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network (2020) (0)
- Research on DoS Attacks Intrusion Detection Model Based on Multi-Dimensional Space Feature Vector Expansion K-Means Algorithm (2021) (0)
- An efficient scheduling algorithm for QoS provisioning in WiMAX networks (2008) (0)
- Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm (2017) (0)
- The Rain Attenuation on Real-Time Video Streaming via Satellite Links (2012) (0)
- Neighborhood area network security in smart grid using security enhanced key updating (2015) (0)
- Design of Feature Selection Algorithm Based on MOEA for IDSs in VANETs (2020) (0)
- ILL-IDS: An incremental lifetime learning IDS for VANETs (2022) (0)
- A watermark detection scheme based on non-parametric model applied to mute machine voice (2023) (0)
- Achieving Faster Handovers in Mobile WiMAX Networks (2011) (0)
- MAC and QoS in WiMAX Mesh Networks (2007) (0)
- Parameterized Spatio-Textual Publish/Subscribe in Road Sensor Networks (2017) (0)
- Improved Handshaking Procedures for Transport Layer Security in Software Defined Networks (2021) (0)
- Edge intelligence‐enabled cyber‐physical systems (2022) (0)
- A Noval and Efficient ECC-Based Authenticated Key Agreement Scheme for Smart Metering in the Smart Grid (2022) (0)
- A flexible and lightweight privacy-preserving handshake protocol based on DTLShps for IoT (2022) (0)
- Bitstream-Oriented Protection for the H.264/Scalable Video Coding (SVC) (2017) (0)
- Task scheduling by Mean Field Annealing algorithm in grid computing (2008) (0)
- Scheduling and managing variable-length message transmission on WDM optical networks (1999) (0)
- An Enhanced 4-way Handshake for the Neighborhood Area Networks in Smart Grid Systems (2015) (0)
- Call Completion in Wireless Networks (2007) (0)
- NetCoM-2009 Organizing Committee (2009) (0)
- An efficient anonymous group handover authentication protocol for MTC devices for 5G networks (2022) (0)
- Certrust: An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios (2022) (0)
- Multimedia Access Protocols (2001) (0)
- Markovian model based indoor location tracking for Internet of Things (IoT) applications (2017) (0)
- Access Control Supported by Information Service Entity in Named Data Networking (2022) (0)
- Fourth International Conference on Wireless and Optical Communications (2016) (0)
- Resource Matching in Carrier Aggregation Enabling 5G Networks (2016) (0)
- An enhanced authentication scheme in GLOMONETs (2011) (0)
- An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks (2019) (0)
- Effect of coupling capacitance in voltage multiplier design optimization for RF energy harvesting (2015) (0)
- Simulated Annealing Algorithm for Optimal Relay Placement in Cellular Networks (2013) (0)
- Incremental Database Based on Distributed Ledger Technology for IDSs (2020) (0)
- A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks (2016) (0)
- A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks (2019) (0)
- An untraceable and server-independent RFID authentication scheme (2011) (0)
- Bandwidth efficient multicast in HetNets (2014) (0)
- A MAC-Layer QoS Provisioning Protocol for Cognitive Radio Networks (2011) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Maodess Ma?
Maodess Ma is affiliated with the following schools: