Author of the publication

An efficient group key management scheme for mobile ad hoc networks.

, , and . Int. J. Secur. Networks, 4 (1/2): 125-134 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nutritional Quality and Safety Traceability System for China's Leafy Vegetable Supply Chain Based on Fault Tree Analysis and QR Code., , , , and . IEEE Access, (2020)Quantify the Landscape Effect of Rural Region Planning Near Metropolis Using High Spatial Resolution Remote Sensing-Case Study in Gaoliying Town in Beijing., , , and . CCTA (1), volume 293 of IFIP Advances in Information and Communication Technology, page 365-373. Springer, (2008)Nonlinear simulation for coupling modeling of air humidity and vent opening in Chinese solar greenhouse based on CFD., , , , , and . Comput. Electron. Agric., (2019)Experimental analysis of application-level intrusion detection algorithms., , , and . Int. J. Secur. Networks, 5 (2/3): 198-205 (2010)Land Use Pattern and Its Effect on Soil Quality in Minjiang River Dry Valley., and . ESIAT (1), page 240-243. IEEE Computer Society, (2009)Problems and Landscape Approach for Ecological Rehabilitation in the Dry Valleys of Southwest China., and . ESIAT (1), page 65-68. IEEE Computer Society, (2009)A Call Center System based on Expert Systems for the Acquisition of Agricultural Knowledge Transferred from Text-to-Speech in China., , , , and . Comput. J., 64 (6): 895-908 (2021)An adaptive control method for the covers on the south roof of Chinese solar greenhouses: A case study of insulation blankets., , , , and . Comput. Electron. Agric., (June 2023)An efficient group key management scheme for mobile ad hoc networks., , and . Int. J. Secur. Networks, 4 (1/2): 125-134 (2009)Web Intrusion Detection Using a Graph-based Sequence Learning Algorithm., and . Security and Management, page 565-570. CSREA Press, (2008)