Author of the publication

Decentralized group key management for dynamic networks using proxy cryptography.

, , and . Q2SWinet, page 123-129. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks., and . IEEE/ACM Trans. Netw., 22 (1): 16-26 (2014)A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks., , , , and . FGIT-FGCN, volume 56 of Communications in Computer and Information Science, page 405-412. Springer, (2009)Password typos resilience in honey encryption., , and . ICOIN, page 593-598. IEEE, (2017)Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems., and . IEEE Trans. Parallel Distributed Syst., 22 (7): 1214-1221 (2011)Design and QoS of a Wireless System for Real-Time Remote Electrocardiography., , , and . IEEE J. Biomed. Health Informatics, 17 (3): 745-755 (2013)Special issue on V2X communications and networks., , , and . J. Commun. Networks, 19 (3): 205-208 (2017)Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage., , , and . IEEE Trans. Cloud Comput., 10 (2): 1008-1020 (2022)A reliable adaptive forwarding approach in named data networking., , , , and . Future Gener. Comput. Syst., (2019)Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query., , and . IEEE Trans. Inf. Forensics Secur., (2023)Password typographical error resilience in honey encryption., , , , and . Comput. Secur., (2019)