Author of the publication

Scalable Localization with Mobility Prediction for Underwater Sensor Networks.

, , , , and . IEEE Trans. Mob. Comput., 10 (3): 335-348 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Over-The-Air Firmware Updates for Sensor Networks., , , , , , and . MASS Workshops, page 97-100. IEEE, (2019)RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements., , , and . IEEE Communications Magazine, 54 (2): 32-38 (2016)An Output Probabilistic Constrained Optimal Control Algorithm Based on Multivariable MAC and its Application in Looper Control System., , and . IEEE Access, (2019)MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation., , , , , , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 231-248. Springer, (2012)Enhanced Side-Channel Cube Attacks on PRESENT., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 332-339 (2013)Accelerating higher-order masking of AES using composite field and SIMD., , , and . ISSPIT, page 575-580. IEEE Computer Society, (2015)Algebraic Differential Fault Attacks on LED using a Single Fault Injection., , , , , and . IACR Cryptology ePrint Archive, (2012)Distributed Algorithms for Energy-Efficient Even Self-Deployment in Mobile Sensor Networks., , , , and . IEEE Trans. Mob. Comput., 13 (5): 1035-1047 (2014)Cryptography Efficient Permutation Instructions for Fast Software., , and . IEEE Micro, 21 (6): 56-69 (2001)SDRT: A reliable data transport protocol for underwater sensor networks., , , , and . Ad Hoc Networks, 8 (7): 708-722 (2010)