Author of the publication

Asymmetric Key Pre-distribution Scheme for sensor networks.

, , , and . IEEE Trans. Wirel. Commun., 8 (3): 1366-1372 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Deniable Authenticated Key Establishment for Internet Protocols., , , and . IACR Cryptology ePrint Archive, (2007)Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption., , , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 183-195. Springer, (2005)Differential Power Analysis on Block Cipher ARIA., , , , and . HPCC, volume 3726 of Lecture Notes in Computer Science, page 541-548. Springer, (2005)A CRT-Based RSA Countermeasure Against Physical Cryptanalysis., , , , and . HPCC, volume 3726 of Lecture Notes in Computer Science, page 549-554. Springer, (2005)Permanent Fault Attack on the Parameters of RSA with CRT., , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 285-296. Springer, (2003)Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC., , , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 333-344. Springer, (2007)Anonymous Cluster-Based MANETs with Threshold Signature., , and . IJDSN, (2013)AKA Protocols for Mobile Communications., and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 400-411. Springer, (2000)Inefficiency of common-multiplicand multiplication and exponentiation algorithms by performing binary complements., , and . Appl. Math. Comput., 189 (1): 285-290 (2007)Universally composable anonymous Hash certification model., , and . Sci. China Ser. F Inf. Sci., 50 (3): 440-455 (2007)