Author of the publication

Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks.

, , , and . CSE, page 633-639. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MS-WMSN: service-oriented planning tool for wireless multimedia monitoring services., , and . Int. J. Inf. Commun. Technol., 8 (1): 50-68 (2016)AI-Based Autonomic and Scalable Security Management Architecture for Secure Network Slicing in B5G., , and . IEEE Netw., 36 (6): 165-174 (2022)Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection., , , , and . GLOBECOM, page 6005-6011. IEEE, (2023)Deep-Ensemble-Learning-Based GPS Spoofing Detection for Cellular-Connected UAVs., , , , and . IEEE Internet Things J., 9 (24): 25068-25085 (2022)Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G., , and . Comput. Networks, (2022)Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks., , , and . Comput. Networks, (2017)Deep Learning for GPS Spoofing Detection in Cellular Enabled Unmanned Aerial Vehicle Systems., , , and . CoRR, (2022)A Deep Transfer Learning-Powered EDoS Detection Mechanism for 5G and Beyond Network Slicing., , , and . GLOBECOM, page 4747-4753. IEEE, (2023)Energy-aware Collision Avoidance stochastic Optimizer for a UAVs set., , , and . IWCMC, page 1636-1641. IEEE, (2020)Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks., , , and . CSE, page 633-639. IEEE Computer Society, (2012)