Author of the publication

A route control method based on cross layer approach between Physical and Media Access Control layer.

, , , , and . IWCMC, page 201-206. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gröbner Basis Based Cryptanalysis of SHA-1., , and . IACR Cryptology ePrint Archive, (2006)Comparison Between XL and Gröbner Basis Algorithms., , , , and . ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, page 338-353. Springer, (2004)Relation between XL algorithm and Gröbner Bases Algorithms., , and . IACR Cryptology ePrint Archive, (2004)Algebraic Cryptanalysis of 58-Round SHA-1., , , and . FSE, volume 4593 of Lecture Notes in Computer Science, page 349-365. Springer, (2007)A route discovery method based on received power of repeater nodes for sensor networks., , , and . ICOIN, page 1-6. IEEE Computer Society, (2012)Security of E2 against Truncated Differential Cryptanalysis., , , and . Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, page 106-117. Springer, (1999)Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2., , , , and . AES Candidate Conference, page 242-254. National Institute of Standards and Technology,, (2000)Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis., , and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 193-207. Springer, (2001)Relation between the XL Algorithm and Gröbner Basis Algorithms., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (1): 11-18 (2006)Development strategy of disaster-resistant WiFi mesh networks and the disaster monitoring and reporting system in a local area., , , , , and . ICOIN, page 139-144. IEEE Computer Society, (2015)