Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multicast Encryption Infrastructure for Security in Sensor Networks., , , and . IJDSN, 5 (2): 139-157 (2009)Secure attribute-based systems., , , and . Journal of Computer Security, 18 (5): 799-837 (2010)The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense., , , , , and . IJDSN, 2 (3): 267-287 (2006)Distributed adaptation methods for wireless sensor networks., , , and . GLOBECOM, page 2967-2971. IEEE, (2003)Clone Detection in Sensor Networks with Ad Hoc and Grid Topologies., , , , and . IJDSN, 5 (3): 209-223 (2009)On the Detection of Clones in Sensor Networks Using Random Key Predistribution., , , , and . IEEE Trans. Syst. Man Cybern. Part C, 37 (6): 1246-1258 (2007)Secure attribute-based systems., , , and . CCS, page 99-112. ACM, (2006)Optimal Layout of Multicast Groups Using Network Embedded Multicast Security in Ad Hoc Sensor Networks., , , and . IJDSN, 3 (3): 273-287 (2007)Fault Tolerant Algorithms for Network-On-Chip Interconnect., , , , , and . ISVLSI, page 46-51. IEEE Computer Society, (2004)Password Exhaustion: Predicting the End of Password Usefulness., , , , , , and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 37-55. Springer, (2006)