Author of the publication

A Hybrid Key Management Protocol for Wireless Sensor Networks.

, and . TrustCom, page 769-776. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VAP code: A secure graphical password for smart devices., , , , , , , and . Comput. Electr. Eng., (2017)A Hybrid Key Management Protocol for Wireless Sensor Networks., and . TrustCom, page 769-776. IEEE Computer Society, (2012)Implementation of group member authentication protocol in mobile ad-hoc networks., , , and . WCNC, page 2205-2210. IEEE, (2006)StealthWorks: Emulating Memory Errors., , and . RV, volume 6418 of Lecture Notes in Computer Science, page 360-367. Springer, (2010)COMeT+: Continuous Online Memory Testing with Multi-Threading Extension., , and . IEEE Trans. Computers, 63 (7): 1668-1681 (2014)Asteroid: Scalable Online Memory Diagnostics for Multi-core, Multi-socket Servers., and . Int. J. Parallel Program., 44 (5): 949-974 (2016)An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network., and . Wireless Personal Communications, 84 (3): 2035-2053 (2015)A Flexible Learning Framework for Kids., , and . WCCCE, page 15:1-15:4. ACM, (2016)Lightweight matrix-based authentication protocol for RFID., , and . SoftCOM, page 1-6. IEEE, (2011)Lightweight protocol for anonymity and mutual authentication in RFID systems., , and . CCNC, page 910-915. IEEE, (2015)