Author of the publication

Secure File Allocation and Caching in Large-scale Distributed Systems.

, , and . SECRYPT, page 182-191. SciTePress, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Challenges for Energy-harvesting Wireless Sensor Networks., , and . PECCS, page 422-425. SciTePress, (2012)Sustainable performance in energy harvesting: wireless sensor networks., , and . e-Energy, page 267-268. ACM, (2013)On the Impact of Energy Harvesting on Wireless Sensor Network Security.. Technical University of Denmark, (2015)Receiver-initiated medium access control protocols for wireless sensor networks., , , and . Comput. Networks, (2015)Energy-efficient medium access control for energy harvesting communications., , , and . IEEE Trans. Consumer Electronics, 61 (4): 402-410 (2015)Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks., , , and . NDT (2), volume 294 of Communications in Computer and Information Science, page 289-301. Springer, (2012)Adaptive Multipath Key Reinforcement for Energy Harvesting Wireless Sensor Networks., and . EUSPN/ICTH, volume 63 of Procedia Computer Science, page 48-55. Elsevier, (2015)Secure File Allocation and Caching in Large-scale Distributed Systems., , and . SECRYPT, page 182-191. SciTePress, (2012)Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks., , and . IJDSN, (2015)Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs., , , and . NordSec, volume 8208 of Lecture Notes in Computer Science, page 1-16. Springer, (2013)