Author of the publication

Privacy Preserving Mobility Control Protocols in Wireless Sensor Networks.

, and . ISPAN, page 159-164. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending against packet injection attacks unreliable ad hoc networks., , , and . GLOBECOM, page 5. IEEE, (2005)KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services., , , and . IEEE Trans. Dependable Secur. Comput., 6 (3): 188-201 (2009)A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications., and . J. Comput. Sci. Technol., 35 (4): 825-842 (2020)Reserving Processors by Precise Scheduling of Mixed-Criticality Tasks., , , and . RTCSA, page 103-108. IEEE, (2021)KTR: an Efficient Key Management Scheme For Air Access Control., , , and . MobiQuitous, page 499-501. IEEE Computer Society, (2005)Originator Data Security for Collaborative Task Execution among Weak Devices., and . MASS, page 421-422. IEEE Computer Society, (2013)Analysis of area-congestion-based DDoS attacks in ad hoc networks., , and . Ad Hoc Networks, 5 (5): 613-625 (2007)Efficient code diversification for network reprogramming in sensor networks.. WISEC, page 145-150. ACM, (2010)Transient clouds: Assignment and collaborative execution of tasks on mobile devices., , , , and . GLOBECOM, page 2801-2806. IEEE, (2014)Marcher: A Heterogeneous System Supporting Energy-Aware High Performance Computing and Big Data Analytics., , and . Big Data Res., (2017)