Author of the publication

An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks.

, , and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 141-149. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks., and . Int. J. Ad Hoc Ubiquitous Comput., 21 (2): 140-155 (2016)An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks., , and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 141-149. Springer, (2012)An Identity-Based Ring Signcryption Scheme., , and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 151-157. Springer, (2012)An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks., , and . Int. J. Netw. Secur., 18 (1): 82-89 (2016)A Computational Review of Identity-based Signcryption Schemes., , and . Int. J. Netw. Secur., 18 (5): 969-977 (2016)PF-IBS: Pairing-Free Identity Based Digital Signature Algorithm for Wireless Sensor Networks., , and . Wirel. Pers. Commun., 97 (1): 1185-1196 (2017)Implementation of DYMO routing protocol., , and . CoRR, (2013)A survey and taxonomy of symmetric key management schemes for wireless sensor networks., , and . CUBE, page 585-592. ACM, (2012)Impersonation attack on CertificateLess key agreement protocol., , and . Int. J. Ad Hoc Ubiquitous Comput., 27 (2): 108-120 (2018)Ant colony algorithms in MANETs: A review., , and . J. Netw. Comput. Appl., 35 (6): 1964-1972 (2012)