Author of the publication

Efficient Vector-Based Forwarding for Underwater Sensor Networks.

, , , , , and . EURASIP J. Wireless Comm. and Networking, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Over-The-Air Firmware Updates for Sensor Networks., , , , , , and . MASS Workshops, page 97-100. IEEE, (2019)Accelerating higher-order masking of AES using composite field and SIMD., , , and . ISSPIT, page 575-580. IEEE Computer Society, (2015)MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation., , , , , , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 231-248. Springer, (2012)Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks., , , , and . WASA, volume 5682 of Lecture Notes in Computer Science, page 305-314. Springer, (2009)SDRT: A reliable data transport protocol for underwater sensor networks., , , , and . Ad Hoc Networks, 8 (7): 708-722 (2010)Physics-aware Roughness Optimization for Diffractive Optical Neural Networks., , , , , , and . DAC, page 1-6. IEEE, (2023)Subword Sorting with Versatile Permutation Instructions., and . ICCD, page 234-241. IEEE Computer Society, (2002)On Permutation Operations in Cipher Design., , , , and . ITCC (2), page 569-577. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.Arbitrary Bit Permutations in One or Two Cycles., , and . ASAP, page 237-. IEEE Computer Society, (2003)Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks., , , , and . Secur. Commun. Networks, 8 (16): 2635-2645 (2015)