Author of the publication

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks.

, , , and . IEEE Trans. Dependable Secur. Comput., 12 (1): 98-110 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Current directions in active programmable network., , and . ICON, page 240-245. IEEE, (2001)Risk Analysis Study of Fully Autonomous Vehicle., , and . CoRR, (2019)Resource-Aware Video Multicasting via Access Gateways in Wireless Mesh Networks., , , , and . IEEE Trans. Mob. Comput., 11 (6): 881-895 (2012)Analysis of an omni-directional narrowband ultrasonic receiver and CSS-based broadband transmission., , and . SenSys, page 361-362. ACM, (2009)A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases., , , , , , , and . CoRR, (2020)Light weight and fine-grained access mechanism for secure access to outsourced data., , , , , and . Concurr. Comput. Pract. Exp., (2019)Robust extended Kalman filter based technique for location management in PCS networks., , and . Comput. Commun., 27 (5): 502-512 (2004)Deploying long-lived and cost-effective hybrid sensor networks., , , and . Ad Hoc Networks, 4 (6): 749-767 (2006)Design, Analysis and Implementation of a Novel Multiple Resource Scheduler., , and . IEEE Trans. Computers, 56 (8): 1071-1086 (2007)B-FERL: Blockchain based Framework for Securing Smart Vehicles., , , , and . CoRR, (2020)