Author of the publication

A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks.

, , , and . WCNC, page 2627-2632. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deformation modeling of remote handling EAMA robot by recurrent neural networks., , , , , and . Ind. Robot, 46 (2): 300-310 (2019)Bit-Parallel Finite Field Multiplier and Squarer Using Polynomial Basis.. IEEE Trans. Computers, 51 (7): 750-758 (2002)Montgomery Multiplier and Squarer for a Class of Finite Fields.. IEEE Trans. Computers, 51 (5): 521-529 (2002)Finite Field Multiplier Using Redundant Representation., , , and . IEEE Trans. Computers, 51 (11): 1306-1316 (2002)High-Speed Architectures for Multiplication Using Reordered Normal Basis., , and . IEEE Trans. Computers, 61 (2): 164-172 (2012)Utilization of differential evolution in inverse kinematics solution of a parallel redundant manipulator., and . KES, page 812-815. IEEE, (2000)A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks., , , and . WCNC, page 2627-2632. IEEE, (2008)Power efficiency of digit level polynomial basis finite field multipliers in GF(2283)., , and . ICECS, page 897-900. IEEE, (2012)Active Fault-Tolerant Control Design for Actuator Fault Mitigation in Robotic Manipulators., , , , and . IEEE Access, (2021)Mastering Autonomous Assembly in Fusion Application with Learning-by-doing: a Peg-in-hole Study., , , , , and . CoRR, (2022)