Author of the publication

A Hybrid Key Management Protocol for Wireless Sensor Networks.

, and . TrustCom, page 769-776. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Analysis of a Generalized Architecture for Reconfigurable m-ary Tree Structures., and . IEEE Trans. Computers, 41 (11): 1465-1478 (1992)Test Suite for Vulnerability Analysis of RFID Systems., , , , , , , and . ICWN, page 70-75. CSREA Press, (2010)A mobile role-based access control system using identity-based encryption with zero knowledge proof., , and . CISDA, page 1-7. IEEE, (2012)An Evaluation of SingleTapBraille Keyboard: A Text Entry Method that Utilizes Braille Patterns on Touchscreen Devices., and . ASSETS, page 161-169. ACM, (2016)Energy-Balancing Unequal Clustering Approach to Reduce the Blind Spot Problem in Wireless Sensor Networks (WSNs)., , and . Sensors, 18 (12): 4258 (2018)DDoS Attack Detection System: Utilizing Classification Algorithms with Apache Spark., , and . NTMS, page 1-7. IEEE, (2018)Lightweight protocol for anonymity and mutual authentication in RFID systems., , and . CCNC, page 910-915. IEEE, (2015)Backward connection preemption in multiclass QoS-aware networks., and . IWQoS, page 153-160. IEEE, (2004)Butterfly Encryption Scheme for Resource-Constrained Wireless Networks., and . Sensors, 15 (9): 23145-23167 (2015)Further Improvements of Fast Encryption Algoirthm for Multimedia., and . Int. J. Netw. Secur., 7 (2): 187-192 (2008)