Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling the Lion Attack in Cognitive Radio Networks., , and . EURASIP J. Wirel. Commun. Netw., (2011)Shared Self-Organized GKM Protocol for MANETs., , and . J. Inf. Sci. Eng., 24 (6): 1629-1646 (2008)A New Class of Codes for Fingerprinting Schemes., , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 398-409. Springer, (2005)A generalization of traceability codes using ideal-based codes., and . ITW, page 66-69. IEEE, (2003)Multicast Copyright Protection System Based on a Trusted Soft-Engine., , , and . Int. J. Bus. Data Commun. Netw., 2 (2): 55-67 (2006)Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts., , , , and . DEXA, volume 2736 of Lecture Notes in Computer Science, page 927-936. Springer, (2003)Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks., , , , , and . GLOBECOM Workshops, page 1663-1668. IEEE, (2012)Implementation of an Efficient Authenticated Dictionary for Certificate Revocation., , , and . ISCC, page 238-243. IEEE Computer Society, (2003)A protocol for detecting malicious hosts based on limiting the execution time of mobile agents., , , and . ISCC, page 251-256. IEEE Computer Society, (2003)Practical Asymmetric Fingerprinting with a TTP., , , and . DEXA Workshops, page 352-356. IEEE Computer Society, (2003)