Networks and Security
231 – 240 of 260
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2018
-
Mark
Social Norms and the Dominance of Low-Doers
(
- Contribution to journal › Article
-
Mark
Error Amplification in Code-based Cryptography
2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258(
- Contribution to journal › Article
- 2017
-
Mark
Editorial : Special issue on coding and cryptography
(
- Contribution to journal › Debate/Note/Editorial
-
Mark
Standard-compliant LTE-A Uplink Scheduling Scheme with Quality of Service
(
- Contribution to journal › Article
-
Mark
Modifying Backoff Freezing Mechanism to Optimize Dense IEEE 802.11 Networks
(
- Contribution to journal › Article
-
Mark
Improved Greedy Nonrandomness Detectors for Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Optimizing DRX for Video delivery over LTE: Utilizing Channel Prediction and In-network caching
2017) Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2017(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An Online Placement Mechanism for Efficient Delivery of User Generated Content
2017) IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD) In IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Trust but Verify : Trust Establishment Mechanisms in Infrastructure Clouds
2017)(
- Thesis › Doctoral thesis (compilation)
-
Mark
Wireless network generator
2017)(
- Non-textual form › Software