Author of the publication

TIDS: threshold and identity-based security scheme for wireless ad hoc networks.

, and . Ad Hoc Networks, 2 (3): 291-307 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Agent-based Distributed Intrusion Detection Methodology for MANETs., , , , and . Security and Management, page 200-206. CSREA Press, (2006)Level-based key establishment for multicast communication in mobile ad hoc networks., , , and . PIMRC, page 2871-2875. IEEE, (2004)Real-Time and Embedded Deep Learning on FPGA for RF Signal Classification., , , , , and . MILCOM, page 1-6. IEEE, (2019)Model Selection for Anomaly Detection in Wireless Ad Hoc Networks., and . CIDM, page 540-546. IEEE, (2007)A cluster based secure routing scheme for wireless ad hoc networks., , , and . IPCCC, page 171-175. IEEE, (2004)Securing Cognitive Radio Networks with Distributed Trust Management against Belief Manipulation Attacks., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2015)TIDS: threshold and identity-based security scheme for wireless ad hoc networks., and . Ad Hoc Networks, 2 (3): 291-307 (2004)A Cross-Layer Approach for Prioritized Frame Transmissions of MPEG-4 Over the IEEE 802.11 and IEEE 802.11e Wireless Local Area Networks., , , , and . IEEE Syst. J., 5 (4): 474-485 (2011)A survey of security visualization for computer network logs., , , , and . Secur. Commun. Networks, 5 (4): 404-421 (2012)Secure Mobile Computing., , , and . IWDC, volume 2918 of Lecture Notes in Computer Science, page 265-278. Springer, (2003)