Author of the publication

An efficient authentication and key management protocol for hierarchical ad hoc sensor networks.

, , and . WCNC, page 2191-2196. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks., , and . ISeCure, 6 (2): 141-153 (2014)Node cooperation for workload offloading in a fog computing network via multi-objective optimization., , , and . J. Netw. Comput. Appl., (2022)An incremental intrusion detection system using a new semi-supervised stream classification method., , , and . Int. J. Commun. Syst., (2017)An analytical model for delay bound of OpenFlow based SDN using network calculus., , , and . J. Netw. Comput. Appl., (2017)A TESLA-based mutual authentication protocol for GSM networks., , and . ISeCure, 1 (1): 3-15 (2009)An efficient authentication and key management protocol for hierarchical ad hoc sensor networks., , and . WCNC, page 2191-2196. IEEE, (2009)TGSM: Towards trustworthy group-based service management for social IoT., , and . Internet Things, (2021)Lagrangian Cooperation (LC): A Fog Node Cooperation Algorithm for Smart Cities., , , and . IEEE Commun. Lett., 26 (7): 1623-1627 (2022)A novel online state-based anomaly detection system for process control networks., , and . Int. J. Crit. Infrastructure Prot., (2019)Modular array structure for non-restoring square root circuit., , and . J. Syst. Archit., 54 (10): 957-966 (2008)