Author of the publication

Improvement of the Security Against Node Capture Attacks Using Dispersed Data Transmission for Wireless Sensor Networks.

, , , , , and . UIC/ATC Workshops, page 340-345. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure communication method in mobile wireless networks., and . MOBILWARE, volume 278 of ACM International Conference Proceeding Series, page 17. (2008)User-Density Dependent Autonomous Clustering for MANET Based on the Laplace Equation., , and . INCoS, volume 1035 of Advances in Intelligent Systems and Computing, page 68-79. Springer, (2019)Structural Change Models of Online Social Networks Caused by External Factors Like Mass Media., and . DASC/PiCom/DataCom/CyberSciTech, page 657-662. IEEE, (2019)Structures of Human Relations and User-Dynamics Revealed by Traffic Data., , , , and . IEICE Trans. Inf. Syst., 87-D (6): 1454-1460 (2004)Power Consumption Characteristics of Autonomous Decentralized Clustering Based on Local Interaction., , , and . IEICE Trans. Inf. Syst., 97-D (12): 2984-2994 (2014)Proposal for Designing Method of Radio Transmission Range to Improve Both Power Saving and Communication Reachability Based on Target Problem., , , , and . IEICE Trans. Commun., 99-B (11): 2271-2279 (2016)Diffusion-Type Autonomous Decentralized Flow Control for Multiple Flows., and . IEICE Trans. Commun., 90-B (1): 21-30 (2007)Guaranteeing Method for the Stability of Cluster Structure Formed by Autonomous Decentralized Clustering Mechanism., , , and . J. Commun., 10 (8): 562-571 (2015)Proposal for Autonomous Decentralized Structure Formation Based on Local Interaction and Back-Diffusion Potential., , , and . IEICE Trans. Commun., 95-B (5): 1529-1538 (2012)Adaptive Timer-Based Countermeasures against TCP SYN Flood Attacks., , , , and . IEICE Trans. Commun., 95-B (3): 866-875 (2012)