Author of the publication

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks.

, , , and . IEEE Trans. Dependable Secur. Comput., 12 (1): 98-110 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model for Voter Scoring and Best Answer Selection in Community Q&A Services., , , , and . Web Intelligence, page 116-123. IEEE Computer Society, (2009)Collusion Detection in Online Rating Systems., , , , , and . APWeb, volume 7808 of Lecture Notes in Computer Science, page 196-207. Springer, (2013)Advanced modes in AES: Are they safe from power analysis based side channel attacks?, , , , and . ICCD, page 173-180. IEEE Computer Society, (2014)Reputation management in crowdsourcing systems., , , , , and . CollaborateCom, page 664-671. ICST / IEEE, (2012)Representation and querying of unfair evaluations in social rating systems., , , , , and . Comput. Secur., (2014)CoRaS: A multiprocessor key corruption and random round swapping for power analysis side channel attacks: A DES case study., , and . ISCAS, page 253-256. IEEE, (2012)Hardware Trojan Detection and Recovery in MPSoCs via On-line Application Specific Testing., , , , and . DDECS, page 1-6. IEEE, (2019)A Note on Induction Schemas in Bounded Arithmetic. CoRR, (2002)An Iterative Method for Calculating Robust Rating Scores., and . IEEE Trans. Parallel Distributed Syst., 26 (2): 340-350 (2015)Efficient Computation of Robust Average of Compressive Sensing Data in Wireless Sensor Networks in the Presence of Sensor Faults., , and . IEEE Trans. Parallel Distributed Syst., 24 (8): 1525-1534 (2013)