Author of the publication

Sink location privacy protection under direction attack in wireless sensor networks.

, , , , and . Wireless Networks, 23 (2): 579-591 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Certificate Revocation and Verification Scheme from Multi-Hashing., , and . J. Comput., 7 (6): 1437-1444 (2012)Improved Power Analysis Attack Based on the Preprocessed Power Traces., , , and . GPC, volume 9663 of Lecture Notes in Computer Science, page 278-289. Springer, (2016)Matching Similar Functions in Different Versions of a Malware., , , , , , and . Trustcom/BigDataSE/ISPA, page 252-259. IEEE, (2016)Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis., , , and . TrustCom/BigDataSE, page 283-288. IEEE, (2018)Development of a Dual-robot System for Parametric Surfaces Polishing., , and . CAR, page 161-165. IEEE Computer Society, (2009)Fast Protocol Recognition by Network Packet Inspection., , , , and . ICONIP (2), volume 7063 of Lecture Notes in Computer Science, page 37-44. Springer, (2011)Sink location privacy protection under direction attack in wireless sensor networks., , , , and . Wireless Networks, 23 (2): 579-591 (2017)