Author of the publication

A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols.

, , , , and . SECURWARE, page 403-411. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Manipulation of Online Recommender Systems., , and . SocInfo, volume 6430 of Lecture Notes in Computer Science, page 125-139. Springer, (2010)Davis Social Links or: How I Learned to Stop Worrying and Love the Net., , and . CSE (4), page 594-601. IEEE Computer Society, (2009)iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks., , , and . INFOCOM, page 968-976. IEEE, (2008)Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks., , , , and . ICC, page 2309-2316. IEEE, (2008)Inter-Profile Similarity (IPS): A Method for Semantic Analysis of Online Social Networks., , , and . Complex (1), volume 4 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 320-333. Springer, (2009)A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols., , , , and . SECURWARE, page 403-411. IEEE Computer Society, (2008)