Author of the publication

Trust Management for Resilient Wireless Sensor Networks.

, , , and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 56-68. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Ordered Bucketization.. IEEE Trans. Dependable Secur. Comput., 11 (3): 292-303 (2014)A new smart smudge attack using CNN., , , , and . Int. J. Inf. Sec., 21 (1): 25-36 (2022)Eavesdropping of Magnetic Secure Transmission Signals and Its Security Implications for a Mobile Payment Protocol., and . IEEE Access, (2018)A New Proxy Signature Scheme Providing Self-delegation., , , and . ICISC, volume 4296 of Lecture Notes in Computer Science, page 328-342. Springer, (2006)An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids., , , and . Inf. Sci., 178 (14): 2968-2982 (2008)Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs., , , , and . IACR Cryptol. ePrint Arch., (2021)Fully Homomorphic Privacy-Preserving Naive Bayes Machine Learning and Classification., , , , and . WAHC@CCS, page 91-102. ACM, (2023)Energy-Efficient Hosting Rich Content from Mobile Platforms with Relative Proximity Sensing., , and . Sensors, 17 (8): 1828 (2017)A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates., , , , and . IEICE Trans. Commun., 90-B (11): 3259-3262 (2007)Efficient Approach for Mitigating Mobile Phishing Attacks., , , and . IEICE Trans. Commun., 101-B (9): 1982-1996 (2018)