Author of the publication

Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH).

, and . KSII Trans. Internet Inf. Syst., 7 (1): 149-165 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of attack models via Unified Modeling Language in Wireless Sensor Networks: A survey study., and . WCNIS, page 692-696. IEEE, (2010)A Secure Certificate for Secure Group Communication.. Security and Management, page 238-240. CSREA Press, (2009)Tree-based routing algorithms on wireless sensor networks: survey., and . J. Systems and IT, 16 (2): 113-121 (2014)Erratum to: A novel secure and efficient hash function with extra padding against rainbow table attacks., , and . Clust. Comput., 21 (1): 1187 (2018)Secure and Efficient Group Key Agreement Protocols.. Texas Tech University, Lubbock, USA, (2007)base-search.net (fttexastechuniv:oai:ttu-ir.tdl.org:2346/11657).Cost-Efficient Routing Protocol (CERP) on Wireless Sensor Networks., and . Wireless Personal Communications, 79 (4): 2517-2530 (2014)Secure and light IoT protocol (SLIP) for anti-hacking.. J. Comput. Virol. Hacking Tech., 13 (4): 241-247 (2017)Enhanced Group Key Generation Algorithm., and . NOMS, IEEE, (2006)Authentication Techniques in the Internet of Things Environment: A Survey.. Int. J. Netw. Secur., 21 (3): 462-470 (2019)Secure and Efficient Tree-based Group Diffie-Hellman Protocol.. KSII Trans. Internet Inf. Syst., 3 (2): 178-194 (2009)