Author of the publication

Security protection over wireless fading channels by exploiting frequency selectivity.

, , , and . WCSP, page 1-5. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Automated User Transparent Approach to log Web URLs for Forensic Analysis., , and . IMF, page 120-127. IEEE Computer Society, (2009)An adaptive framework for trust based security in pervasive computing environment., , and . CCNC, page 624-628. IEEE, (2012)On Trust Management for Multimedia P2P Applications in Autonomic Networking., , and . APSCC, page 24-28. IEEE Computer Society, (2011)Current approaches and future directions for Cyber Threat Intelligence sharing: A survey., , , , and . J. Inf. Secur. Appl., (2024)Security protection over wireless fading channels by exploiting frequency selectivity., , , and . WCSP, page 1-5. IEEE, (2016)Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks., , and . NBiS, page 316-320. IEEE Computer Society, (2009)A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks., and . ISA, volume 5576 of Lecture Notes in Computer Science, page 712-721. Springer, (2009)Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs)., and . ISA, volume 5576 of Lecture Notes in Computer Science, page 732-740. Springer, (2009)Modeling interaction using trust and recommendation in ubiquitous computing enivornment., , and . EURASIP J. Wireless Comm. and Networking, (2012)STEP-a: An Algorithmic Approach towards Trust Based Security in Pervasive Computing Environment., , and . APSCC, page 330-336. IEEE Computer Society, (2011)