Author of the publication

Deterministic En-Route Filtering of False Reports: A Combinatorial Design Based Approach.

, and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal placement of sensor nodes for water quality measurement., and . WOCN, page 1-9. IEEE, (2015)Attacks on Web Services and Mitigation Schemes., , and . SECRYPT, page 499-504. SciTePress, (2010)Throttling DDoS Attacks., , , , , and . SECRYPT, page 121-126. INSTICC Press, (2009)Detecting Phishing Websites using Automation of Human Behavior., and . CPSS@AsiaCCS, page 33-42. ACM, (2017)Bad Signature Identification in a Batch Using Error Detection Codes., , and . ISEA-ISAP, volume 939 of Communications in Computer and Information Science, page 53-66. Springer, (2018)Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification., , and . SECRYPT, page 440-445. SciTePress, (2016)Secure Web Based Single Sign-On (SSO) Framework Using Identity Based Encryption System., and . ARTCom, page 430-432. IEEE Computer Society, (2009)A Random Key Generation Scheme Using Primitive Polynomials over GF(2)., and . SSCC, volume 625 of Communications in Computer and Information Science, page 42-51. Springer, (2016)Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications., , , , , and . Int. J. Inf. Sec., 17 (1): 105-120 (2018)High-performance medical image secret sharing using super-resolution for CAD systems., and . Appl. Intell., 52 (14): 16852-16868 (2022)