Author of the publication

Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements.

, and . ICA3PP (1), volume 6081 of Lecture Notes in Computer Science, page 538-548. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influences on children's visual cognition capabilities through playing 'intelligent matrix' developed by the augmented virtual reality technology., , and . Int. J. Humanit. Arts Comput., 6 (1-2): 160-171 (2012)Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements., and . ICA3PP (1), volume 6081 of Lecture Notes in Computer Science, page 538-548. Springer, (2010)Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks., and . EURASIP J. Wireless Comm. and Networking, (2011)Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks.. Connect. Sci., 34 (1): 274-300 (2022)Changes in MIS research: status and themes from 1989 to 2000., , , , , , and . Int. J. Inf. Syst. Chang. Manag., 1 (1): 3-35 (2006)Secure cloud internet of vehicles based on blockchain and data transmission scheme of map/reduce.. Comput. Sci. Inf. Syst., 20 (1): 137-156 (2023)The Secure Vehicle-to-Vehicle and Vehicle-to-Group Communication Mechanisms in Smart City., , and . BigDataService, page 186-192. IEEE Computer Society, (2018)Building a Multi-purposes Digital Media System Using MPEG-21 and XML., , and . Edutainment, volume 3942 of Lecture Notes in Computer Science, page 1383-1389. Springer, (2006)High Effect Secure Data Transmission Mechanisms in Wireless Sensor Networks Using ID-Based Key Management Scheme.. J. Convergence Inf. Technol., 4 (1): 77-83 (2009)Dynamic multicast height balance key agreements for secure multicast communication in ad hoc networks., , , and . IRI, page 55-58. IEEE Systems, Man, and Cybernetics Society, (2010)