Author of the publication

Dynamic Distributed Certificate Authority Services for Mobile Ad Hoc Networks.

, , , and . WCNC, page 2625-2630. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Different Signature Purposes in Workflow Systems - A Case Study., , and . ICSC, volume 1749 of Lecture Notes in Computer Science, page 360-366. Springer, (1999)Dynamic Software Birthmark for Java Based on Heap Memory Analysis., , and . Communications and Multimedia Security, volume 7025 of Lecture Notes in Computer Science, page 94-107. Springer, (2011)Authenticated Directed Diffusion., , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 366-377. Springer, (2008)Providing distributed certificate authority service in cluster-based mobile ad hoc networks., , , , and . Comput. Commun., 30 (11-12): 2442-2452 (2007)Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design., , , , , , , , , and . Quantum Inf. Process., 13 (6): 1425-1435 (2014)Randomized Competitive Algorithms for Successful and Unsuccessful Search., and . Comput. J., 39 (5): 427-439 (1996)Unsuccessful Search in Self-Adjusting Data Structures., and . J. Algorithms, 15 (3): 447-481 (1993)Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed., , , , , , , , , and 11 other author(s). IEEE J. Sel. Areas Commun., 24 (10): 1889-1900 (2006)Signcryption in Hierarchical Identity Based Cryptosystem., , , and . IACR Cryptology ePrint Archive, (2004)WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps., , , , , and . WISEC, page 25:1-25:12. ACM, (2015)