Author of the publication

An efficient password authenticated key exchange protocol for WLAN and WiMAX.

, , and . ICWET, page 881-885. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-party encryption (MPE): secure communications in delay tolerant networks., , and . Wirel. Networks, 21 (4): 1243-1258 (2015)Rise and Rise of Blockchain: A Patent Statistics Approach to Identify the Underlying Technologies., , , , and . ACIIDS (Companion), volume 1178 of Communications in Computer and Information Science, page 456-466. Springer, (2020)Secure Data Aggregation in Wireless Sensor Networks., and . Wireless Sensor Network Technologies for the Information Explosion Era, volume 278 of Studies in Computational Intelligence, Springer, (2010)Challenges in Secure Sensor-Cloud Computing., , , and . Secure Data Management, volume 6933 of Lecture Notes in Computer Science, page 70-84. Springer, (2011)ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection., , , and . NSS, volume 12570 of Lecture Notes in Computer Science, page 388-407. Springer, (2020)PIP: Privacy and Integrity Preserving Data Aggregation in Wireless Sensor Networks., and . SRDS, page 10-19. IEEE Computer Society, (2013)Distributed Attribute Based Access Control of Aggregated Data in Sensor Clouds., and . SRDS, page 218-227. IEEE Computer Society, (2015)An efficient password authenticated key exchange protocol for WLAN and WiMAX., , and . ICWET, page 881-885. ACM, (2011)Searching on Non-Systematic Erasure Codes., and . PST, page 1-8. IEEE, (2021)Device-centric data reordering and buffer management for mobile Internet using Multipath Transmission Control Protocol., and . Int. J. Commun. Syst., (2021)