Author of the publication

Secure In-Band Bootstrapping for Wireless Personal Area Networks.

, , , , , , and . IEEE Internet of Things Journal, 3 (6): 1385-1394 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved whale optimisation algorithm for distributed assembly flow shop with crane transportation., , , , and . Int. J. Autom. Control., 15 (6): 710-743 (2021)Construction and enumeration of a special class of transitive relations., , and . Ars Comb., (2014)Conceptual modeling for customized XML schemas., , , , , and . Data Knowl. Eng., 54 (1): 57-76 (2005)Fundamentals of RTOS-Based Digital Controller Implementation.. Handbook of Networked and Embedded Control Systems, Birkhäuser, (2005)Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks., , , and . TrustCom/BigDataSE/ISPA (1), page 104-110. IEEE, (2015)Safe and Environment-Friendly Forward Collision Warning Messages in the Advance Warning Area of a Construction Zone., , , and . Int. J. Intelligent Transportation Systems Research, 15 (3): 166-179 (2017)Online Notes-taker: Toward a Web-based Agent Mechanism Supporting Comprehensible Reading., and . JCIS, page 1052-1055. JCIS / Association for Intelligent Machinery, Inc., (2002)LBGK Simulations of Turing Patterns in CIMA Model., , , and . J. Sci. Comput., 16 (2): 121-134 (2001)Robust single cell quantification of immune cell subtypes in histological samples., , , , , , , and . BHI, page 121-124. IEEE, (2017)The study of multi-instance purchase decision-making for minimising customers' cost under fluctuating cloud demands., , and . IJHPCN, 9 (1/2): 127-133 (2016)