Author of the publication

Optimized Hash Tree for Authentication in Sensor Networks.

, and . IEEE Communications Letters, 11 (2): 149-151 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generation of a Precise and Efficient Lane-Level Road Map for Intelligent Vehicle Systems., , , and . IEEE Trans. Vehicular Technology, 66 (6): 4517-4533 (2017)Discrete Wavelet Transform Meets Transformer: Unleashing the Full Potential of the Transformer for Visual Recognition., and . IEEE Access, (2023)UNICON: Uncertainty-Conditioned Policy for Robust Behavior in Unfamiliar Scenarios., , , , and . IEEE Robotics Autom. Lett., 7 (4): 9099-9106 (2022)Sensor Fusion for Aircraft Detection at Airport Ramps Using Conditional Random Fields., and . IEEE Trans. Intell. Transp. Syst., 23 (10): 18100-18112 (2022)Regenerator placement algorithms for connection establishment in all-optical networks., , and . GLOBECOM, page 1205-1209. IEEE, (2000)IEEE CTSoc and IEIE Korea MoU Signing Ceremony., and . IEEE Consumer Electron. Mag., 11 (5): 6 (2022)Optimized Hash Tree for Authentication in Sensor Networks., and . IEEE Communications Letters, 11 (2): 149-151 (2007)An automatic portscan detection system with adaptive threshold setting., , and . J. Commun. Networks, 12 (1): 74-85 (2010)RSU-Based Distributed Key Management (RDKM) For Secure Vehicular Multicast Communications., , , and . IEEE J. Sel. Areas Commun., 29 (3): 644-658 (2011)BLAST: B-LAyered bad-character SHIFT tables for high-speed pattern matching., and . IET Inf. Secur., 7 (3): 195-202 (2013)