Author of the publication

SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor network.

, , , and . Peer Peer Netw. Appl., 17 (2): 701-721 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IPRA: Iterative Parent-Based Routing Algorithm for Wireless Sensor Networks., , and . Wirel. Pers. Commun., 124 (4): 3321-3353 (2022)SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor network., , , and . Peer Peer Netw. Appl., 17 (2): 701-721 (March 2024)Hyperspectral image classification using multiobjective optimization., , , , and . Multim. Tools Appl., 81 (18): 25345-25362 (2022)Efficient surface detection for assisting Collaborative Robots., , , , and . Robotics Auton. Syst., (March 2023)SLP-RRFPR: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks., , , , , , and . Multim. Tools Appl., 81 (8): 11145-11185 (2022)Hybrid energy-efficient multi-path routing for wireless sensor networks., , and . Comput. Electr. Eng., (2018)DSERR: Delay Sensitive Energy Efficient Reliable Routing Algorithm., , and . Wirel. Pers. Commun., 97 (3): 3685-3704 (2017)Simulating Raga Notes with a Markov Chain of Order 1-2., , and . CoRR, (2018)Multi-Objective Optimization Based Test Pattern Generation for Hardware Trojan Detection., , , and . J. Electron. Test., 39 (3): 371-385 (June 2023)A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission., , , , and . Wirel. Networks, 28 (2): 827-852 (2022)