Author of the publication

An efficient group key establishment in location-aided mobile ad hoc networks.

, and . PE-WASUN, page 57-64. ACM, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A mobile role-based access control system using identity-based encryption with zero knowledge proof., , and . CISDA, page 1-7. IEEE, (2012)Test Suite for Vulnerability Analysis of RFID Systems., , , , , , , and . ICWN, page 70-75. CSREA Press, (2010)An Evaluation of SingleTapBraille Keyboard: A Text Entry Method that Utilizes Braille Patterns on Touchscreen Devices., and . ASSETS, page 161-169. ACM, (2016)Backward connection preemption in multiclass QoS-aware networks., and . IWQoS, page 153-160. IEEE, (2004)Lightweight protocol for anonymity and mutual authentication in RFID systems., , and . CCNC, page 910-915. IEEE, (2015)DDoS Attack Detection System: Utilizing Classification Algorithms with Apache Spark., , and . NTMS, page 1-7. IEEE, (2018)Further Improvements of Fast Encryption Algoirthm for Multimedia., and . Int. J. Netw. Secur., 7 (2): 187-192 (2008)Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm., , , and . IEEE Trans. Netw. Sci. Eng., 8 (3): 2559-2574 (2021)A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks., , , and . Symmetry, 14 (8): 1625 (2022)How Effective is Personalization in Persuasive Interventions for Reducing Sedentary Behavior and Promoting Physical Activity: A Systematic Review., , and . PERSUASIVE (Adjunct), volume 2629 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)