Author of the publication

An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks.

, , , and . KSII Trans. Internet Inf. Syst., 2 (5): 265-279 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Grid-based Context-aware Recommender System for Mobile Healthcare Applications., , , , and . GCA, page 100-106. CSREA Press, (2008)Real-Time Performance Estimation for Dynamic, Distributed Real-Time Systems., , and . International Conference on Computational Science (3), volume 2331 of Lecture Notes in Computer Science, page 1071-1079. Springer, (2002)Quality of Service Negotiation for Distributed, Dynamic Real-Time Systems., , , , and . IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 757-765. Springer, (2000)Towards Media Intercloud Standardization Evaluating Impact of Cloud Storage Heterogeneity., , and . CoRR, (2016)Multi-objective Optimization Method for Resource Scaling in Cloud Computing., , and . IMCOM, page 97:1-97:6. ACM, (2018)Resource Prediction for Inter-cloud Broker., and . NPC, volume 8707 of Lecture Notes in Computer Science, page 559-562. Springer, (2014)Efficient Resource Management Scheme of TCP Buffer Tuned Parallel Stream to Optimize System Performance., , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 683-692. Springer, (2005)Network Anomaly Detection based on Late Fusion of Several Machine Learning Algorithms, , and . International Journal of Computer Networks & Communications (IJCNC), 12 (6): 117-131 (November 2020)Data classification and scheduling for sensor virtualisation scheme in public healthcare system., , , and . Int. J. Sens. Networks, 22 (4): 259-273 (2016)A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks., , , and . Secur. Commun. Networks, 5 (5): 485-495 (2012)