Author of the publication

Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements.

, , , , , and . IEEE Netw., 21 (4): 51-56 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using qualia and multi-layered relationships in malware detection., , , , and . CICS, page 91-98. IEEE, (2009)Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment., , , , and . ICC, page 1197-1202. IEEE, (2007)Developing an Insider Threat Model Using Functional Decomposition., , and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 412-417. Springer, (2005)Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes., , , , and . MobiQuitous, page 1-8. IEEE Computer Society, (2007)Performance evaluation and analysis of effective range and data throughput for unmodified bluetooth communication devices., , , and . ICON, page 665-671. IEEE, (2003)A survey of state-of-the-art in anonymity metrics., , , , and . NDA, page 31-40. ACM, (2008)Bluetooth Discovery Time with Multiple Inquirers., , and . HICSS, IEEE Computer Society, (2006)An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks., , , and . HICSS, page 292. IEEE Computer Society, (2007)Graduate Digital Forensics Education at the Air Force Institute of Technology., , and . HICSS, page 264. IEEE Computer Society, (2007)A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission., , and . PerCom, page 1-7. IEEE Computer Society, (2009)