Author of the publication

Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks.

, , and . ICDCS, page 2200-2205. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks., , and . Concurr. Comput. Pract. Exp., (2019)Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes., , and . SAC, page 184-193. ACM, (2021)Poster: Multi-Layer Threat Analysis of the Cloud., , , and . CCS, page 3419-3421. ACM, (2022)Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages., , , , , , and . SEFM, volume 11724 of Lecture Notes in Computer Science, page 471-490. Springer, (2019)Privacy Challenges With Protecting Live Vehicular Location Context., , , , and . IEEE Access, (2020)Near optimal routing protocols for source location privacy in wireless sensor networks: modelling, design and evaluation.. University of Warwick, Coventry, UK, (2018)British Library, EThOS.Into the Heat of the Debate: Simulating a Program Committee Within Computer Science Education., , and . EDUCON, page 1-5. IEEE, (2023)A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks., , and . ACM Trans. Internet Things, 2 (1): 4:1-4:32 (2020)Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things., , , , , and . ACM Trans. Sens. Networks, 18 (2): 29:1-29:41 (2022)ThreatPro: Multi-Layer Threat Analysis in the Cloud., , , and . CoRR, (2022)