Author of the publication

Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements.

, and . ICA3PP (1), volume 6081 of Lecture Notes in Computer Science, page 538-548. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transmission of layered video streaming via multi-path on ad hoc networks., , and . Multimedia Tools Appl., 34 (2): 155-177 (2007)Reliable cross-layer multicast with local backtracking for improving transmission control protocol performance in ad hoc networks., , , and . IET Commun., 1 (5): 887-892 (2007)A Context-Aware Interactive Health Care System Based on Ontology and Fuzzy Inference., and . J. Medical Systems, 39 (9): 105:1-105:25 (2015)Dual Function Seal: Visualized Digital Signature for Electronic Medical Record Systems., , and . J. Medical Systems, 36 (5): 3115-3121 (2012)Low Cost RFID Real Lightweight Binding Proof Protocol for Medication Errors and Patient Safety., , and . J. Medical Systems, 36 (2): 823-828 (2012)Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks., , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 112-121. Springer, (2006)Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks., and . EURASIP J. Wireless Comm. and Networking, (2011)Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements., and . ICA3PP (1), volume 6081 of Lecture Notes in Computer Science, page 538-548. Springer, (2010)A limited flooding scheme for mobile ad hoc networks., , and . WiMob (3), page 473-478. IEEE, (2005)0-7803-9181-0.Adaptive Power-Aware Clustering and Multicasting Protocol for Mobile Ad Hoc Networks., , , and . UIC, volume 4159 of Lecture Notes in Computer Science, page 331-340. Springer, (2006)