Author of the publication

Formal Security Verification of Transport Protocols for Wireless Sensor Networks.

, , and . ICCSAMA, volume 282 of Advances in Intelligent Systems and Computing, page 389-403. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Problem Domain Analysis of IoT-Driven Secure Data Markets., and . Euro-CYBERSEC, volume 821 of Communications in Computer and Information Science, page 57-67. Springer, (2018)A Pessimistic Approach to Trust in Mobile Agent Platforms., , and . IEEE Internet Comput., 4 (5): 40-48 (2000)A survey of security issues in hardware virtualization., , and . ACM Comput. Surv., 45 (3): 40:1-40:34 (2013)Enforcing service availability in mobile ad-hoc WANs., and . MobiHoc, page 87-96. IEEE, (2000)Protecting the Itinerary of Mobile Agents., , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 301. Springer, (1998)The quest for security in mobile ad hoc networks., , and . MobiHoc, page 146-155. ACM, (2001)Security analysis of reliable transport layer protocols for wireless sensor networks., and . PerCom Workshops, page 419-424. IEEE Computer Society, (2010)Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases., and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 192-206. Springer, (2012)PANEL: Position-based Aggregator Node Election in Wireless Sensor Networks., and . MASS, page 1-9. IEEE Computer Society, (2007)Securing coding based distributed storage in wireless sensor networks., , and . MASS, page 821-827. IEEE Computer Society, (2008)