Author of the publication

An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks.

, , , and . SAINT, page 300-306. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Inomata, Atsuo
add a person with the name Inomata, Atsuo
 

Other publications of authors with the same name

A Secure Cloud-centric IoT Framework for Smart Device Registration., , and . J. Inf. Process., (2021)Migrating to Zero Trust Architecture: Reviews and Challenges., , and . Secur. Commun. Networks, (2021)Uncompressed 4K2K and HD live transmission on global internet., , , , and . SIGGRAPH ASIA Posters, page 28:1. ACM, (2009)Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks., , , , and . ICUCT, volume 4412 of Lecture Notes in Computer Science, page 140-149. Springer, (2006)Location tracking prevention with dummy messages for vehicular communications., , , , and . ITST, page 56-61. IEEE, (2013)A Proposal of Short Proxy Signature using Pairing., , and . ITCC (1), page 631-635. IEEE Computer Society, (2005)A Two-tier Overlay Publish/Subscribe System for Sensor Data Stream Using Geographic Based Load Balancing., , , and . AINA Workshops, page 749-756. IEEE Computer Society, (2013)Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks., , , and . Inf. Media Technol., 1 (2): 1191-1203 (2006)MetaFa: Metadata Management Framework for Data Sharing in Data-Intensive Applications., , , and . IWANN (2), volume 5518 of Lecture Notes in Computer Science, page 655-658. Springer, (2009)The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing., , , and . ICISSP, page 440-449. SCITEPRESS, (2021)