Author of the publication

Maximizing lifetime of event-unobservable wireless sensor networks.

, , , and . Comput. Stand. Interfaces, 33 (4): 401-410 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures., , and . Inf. Sci., (2012)Optically Interrogated Unique Object with Simulation Attack Prevention., , , , , and . DATE, page 198-203. IEEE, (2019)Towards Reactive Acoustic Jamming for Personal Voice Assistants., , , and . MPS@CCS, page 12-17. ACM, (2018)Node Identification Using Clock Skew., and . REALWSN, volume 281 of Lecture Notes in Electrical Engineering, page 111-123. Springer, (2013)Maximizing lifetime of event-unobservable wireless sensor networks., , , and . Comput. Stand. Interfaces, 33 (4): 401-410 (2011)Adversarial Command Detection Using Parallel Speech Recognition Systems., , , and . CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS, volume 13106 of Lecture Notes in Computer Science, page 238-255. Springer, (2021)Codo: confidential data storage for wireless sensor networks., , , , and . MASS Workshops, page 1-6. IEEE Computer Society, (2012)978-1-4673-2433-5.Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants., , , and . IEEE Symposium on Security and Privacy Workshops, page 144-149. IEEE, (2019)Optimal data compression and forwarding in wireless sensor networks., , and . IEEE Commun. Lett., 14 (5): 408-410 (2010)Combined secure storage and communication for the Internet of Things., , , , and . SECON, page 523-531. IEEE, (2013)