Author of the publication

A Deterministic Key Management Scheme for Securing Cluster-Based Sensors Networks.

, , , and . EUC, page 422-427. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating advanced mobility models with LEMMA., and . SpringSim, SCS/ACM, (2009)A new middleware for pervasive IPv6 mobile computing., and . ICON, page 481-488. IEEE, (2003)An analysis of multicast delivery with mobile receivers., and . PIMRC, page 2690-2695. IEEE, (2003)Prefix Continuity and Global Address Autoconfiguration in IPV6 Ad Hoc Networks - Short Version., and . Med-Hoc-Net, volume 197 of IFIP, page 311-320. Springer, (2005)Active Networks for IPv6 Communication Redirection., , and . MATA, volume 1931 of Lecture Notes in Computer Science, page 139-150. Springer, (2000)An experimental performance evaluation of the IETF FMIPv6 protocol over IEEE 802.11 WLANs., and . WCNC, page 568-574. IEEE, (2006)Stronger interaction between link layer and network layer for an optimized mobility management in heterogeneous IPv6 networks., and . Pervasive Mob. Comput., 2 (3): 233-261 (2006)Algorithms for Prefix Continuity in IPv6 Ad Hoc Networks., and . Ad Hoc Sens. Wirel. Networks, 2 (2): 205-225 (2006)Efficient multicast routing in wireless mesh networks connected to internet., , , and . InterSense, volume 138 of ACM International Conference Proceeding Series, page 26. ACM, (2006)Blockchain Using Proof-of-Interaction., , and . NETYS, volume 12754 of Lecture Notes in Computer Science, page 129-143. Springer, (2021)