Author of the publication

Probabilistic Key Pre-Distribution for Heterogeneous Mobile Ad Hoc Networks Using Subjective Logic.

, , , and . AINA, page 185-192. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure cloud storage with anonymous deduplication using ID-based key management., and . J. Supercomput., 79 (2): 2356-2382 (2023)Fully Distributed Self Certified Key Management for Large-Scale MANETs., , , and . UIC/ATC, page 96-102. IEEE Computer Society, (2013)Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach., , and . IEEE Trans. Mob. Comput., 15 (9): 2333-2344 (2016)How UAVs' Highly Dynamic 3D Movement Improves Network Security?, and . CoRR, (2021)KPsec: Secure End-to-End Communications for Multi-Hop Wireless Networks., , and . CoRR, (2019)A novel human mobility model for MANETs based on real data., , , and . ICCCN, page 1-7. IEEE, (2014)Fully distributed ECC-based key management for mobile ad hoc networks., , , and . Comput. Networks, (2017)UASTrustChain: A Decentralized Blockchain- Based Trust Monitoring Framework for Autonomous Unmanned Aerial Systems., , , and . IEEE Access, (2020)Secure Overlay Routing for Large Scale Networks., , and . IEEE Trans. Netw. Sci. Eng., 6 (3): 501-511 (2019)Decentralized Social Networking Using Named-Data., , and . CN, volume 522 of Communications in Computer and Information Science, page 421-430. Springer, (2015)