Author of the publication

Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks.

, , , , , and . GLOBECOM Workshops, page 1663-1668. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The TAMESIS Project: Enabling Technologies for the Health Status Monitoring and Secure Exchange of Clinical Record., , , , and . CISIS, page 312-319. IEEE Computer Society, (2013)Robust detection of primary user emulation attacks in IEEE 802.22 networks., , and . CogART, page 51. ACM, (2011)Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks., , , and . Comput. Commun., 30 (7): 1498-1512 (2007)Cooperative detection of primary user emulation attacks in CRNs., , and . Comput. Networks, 56 (14): 3374-3384 (2012)Building Hierarchical Public Key Infrastructures in Mobile Ad-Hoc Networks., , , and . MSN, volume 4325 of Lecture Notes in Computer Science, page 485-496. Springer, (2006)Data Marketplaces with a Free Sampling Service., , , , , , , , , and 3 other author(s). SCC, page 333-338. IEEE, (2022)Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm., , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 526-539. Springer, (2007)Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks., , , , , and . GLOBECOM Workshops, page 1663-1668. IEEE, (2012)SCFS: Towards Design and Implementation of a Secure Distributed Filesystem., , and . SECRYPT, page 169-176. INSTICC Press, (2008)DocCloud: A document recommender system on cloud computing with plausible deniability., , , and . Inf. Sci., (2014)