Author of the publication

Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange.

, , , and . J. Comput. Sci. Technol., 23 (3): 377-388 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Security Attacks in HealthcareWSNs Implemented on 802.15.4 Beacon Enabled Clusters., , and . CCNC, page 741-745. IEEE, (2007)IEEE 802.15.4: Signature-Based Intrusion Detection in Wireless Sensor Networks (WSNs)., , and . Encyclopedia of Wireless and Mobile Communications, (2008)Key Exchange in 802.15.4 Networks and Its Performance Implications., , and . MSN, volume 4325 of Lecture Notes in Computer Science, page 497-508. Springer, (2006)Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange., , , and . J. Comput. Sci. Technol., 23 (3): 377-388 (2008)Performance of Key Distribution in 802.15.4 Beacon Enabled Cluster., , and . WCNC, page 4354-4359. IEEE, (2007)Performance implications of periodic key exchanges and packet integrity overhead in an 802.15.4 beacon enabled cluster., , and . Int. J. Sens. Networks, 3 (1): 33-42 (2008)Decision centric identification and rank ordering of security metrics., , and . LCN, page 208-211. IEEE Computer Society, (2012)The Cost of Security: Performance of ZigBee Key Exchange Mechanism in an 802.15.4 Beacon Enabled Cluster., , , and . MASS, page 876-881. IEEE Computer Society, (2006)Software updates as a security metric: Passive identification of update trends and effect on machine infection., , and . MILCOM, page 1-6. IEEE, (2012)An effective empirical approach to VoIP traffic classification., , , , and . Turkish J. Electr. Eng. Comput. Sci., (2017)