Author of the publication

An efficient authentication and key management protocol for hierarchical ad hoc sensor networks.

, , and . WCNC, page 2191-2196. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A TESLA-based mutual authentication protocol for GSM networks., , and . ISeCure, 1 (1): 3-15 (2009)An efficient authentication and key management protocol for hierarchical ad hoc sensor networks., , and . WCNC, page 2191-2196. IEEE, (2009)An efficient certificateless signcryption scheme in the standard model., and . ISeCure, 9 (1): 3-16 (2017)An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks., , and . ISeCure, 6 (2): 141-153 (2014)On the Security of an Unconditionally Secure, Universally Composable Inner Product Protocol., and . CoRR, (2018)Optimally Efficient Secure Scalar Product With Applications in Cloud Computing., , and . IEEE Access, (2019)An adaptive MAC protocol for wireless LANs., , , and . J. Commun. Networks, 16 (3): 311-321 (2014)Survivability evaluation for networks carrying complex traffic flows., , , and . Digit. Commun. Networks, 9 (2): 534-544 (April 2023)Comments on Ünconditionally Secure, Universally Composable Privacy Preserving Linear Algebra"., and . IEEE Trans. Inf. Forensics Secur., (2020)Universal designated verifier signature scheme with non-delegatability in the standard model., , , and . Inf. Sci., (2019)