Akon, M., Islam, M. T., Shen, X. S., & Singh, A. (2010). Exchanging Peers to Establish P2P Networks In Handbook of Peer-to-Peer Networking (pp. 143-165). Springer, Boston, MA.
Reference author: Xuemin Shen
First name
Xuemin
Middle name
Sherman
Last name
Shen
Matsuda, T., Nakayama, H., Shen, X. S., Nemoto, Y., & Kato, N. (2010). Gateway selection protocol in hybrid manet using dymo routing Mobile Networks and Applications, 15, 205-215.
Thulasiraman, P., & Shen, X. S. (2010). Interference aware resource allocation for hybrid hierarchical wireless networks Computer Networks, 54, 2271-2280.
Lin, X., Lu, R., & Shen, X. S. (2010). MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks Wireless Communications and Mobile Computing, 10, 843-856.
Islam, M. T., Akon, M., & Shen, X. S. (2010). P2P Approach for Web Services Publishing and Discovery In Handbook of Peer-to-Peer Networking (pp. 1315-1332). Springer, Boston, MA.
Mehrjoo, M., Awad, M. K., Dianati, M., & Shen, X. S. (2010). Design of fair weights for heterogeneous traffic scheduling in multichannel wireless networks IEEE Transactions on Communications, 58, 2892-2902.
Jiang, Y., Zhu, H., Shi, M., Shen, X. S., & Lin, C. (2010). An efficient dynamic-identity based signature scheme for secure network coding Computer Networks, 54, 28-40.
Hou, F., Ho, P.-H., & Shen, X. S. (2010). An efficient scheduling scheme with diverse traffic demands in IEEE 802.16 networks Wireless Communications and Mobile Computing, 10, 959-971.
Lin, X., Lu, R., Foxton, K., & Shen, X. S. (2010). An efficient searchable encryption scheme and its application in network forensics International Conference on Forensics in Telecommunications, Information, and Multimedia, 66-78. Springer, Berlin, Heidelberg.
Liang, X., Barua, M., Lu, R., & Shen, X. S. (2011). Privacy-preserving wireless data transmission for e-healthcare applications IEEE COMSOC MMTC E-LetterVol, 6.
- Previous page
- Currently on page 8 8
- Next page