Author of the publication

An Implementation of Secure Data Exchange System with Multi-hop Routing in Wireless Delay Tolerant Network Using Attribute-Based Encryption.

, and . CANDAR, page 470-476. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Pairing-Based Anonymous Credential System with Efficient Attribute Proofs., , and . J. Inf. Process., 20 (3): 774-784 (2012)A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based Encryption., and . J. Inf. Process., (2017)An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption., and . CANDAR, page 536-542. IEEE Computer Society, (2014)An implementation of secure wireless sensor network for e-healthcare system., , and . IC3INA, page 69-74. IEEE, (2014)Guaranteed Time Slot allocation method for IEEE 802.15.4 Wireless Sensor Network., , , and . IC3INA, page 85-88. IEEE, (2015)An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc Communication., , , and . CANDAR, page 57-65. IEEE Computer Society, (2018)Anonymous IEEE802.1X Authentication System Using Group Signatures., , , and . J. Inf. Process., (2010)Monitoring system of patient position based on wireless body area sensor network., , , and . ICCE-TW, page 396-397. IEEE, (2015)PEGAS: Partitioned GTS allocation scheme for IEEE 802.15.4 networks., , and . IC3INA, page 29-32. IEEE, (2013)Efficient Proofs of Attributes in Pairing-Based Anonymous Credential System., , and . PETS, volume 6794 of Lecture Notes in Computer Science, page 246-263. Springer, (2011)