Author of the publication

Distributed certificate authority scheme with weighted secret sharing for mobile ad-hoc networks.

, , and . NOF, page 1-6. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed certificate authority scheme with weighted secret sharing for mobile ad-hoc networks., , and . NOF, page 1-6. IEEE, (2013)Business Process Integration with Web Services., , , and . SNPD, page 192-197. IEEE Computer Society, (2005)An Effective Authentication Scheme in Mobile Ad Hoc Network., , and . SNPD, page 249-252. IEEE Computer Society, (2006)Ferromagnetic soft continuum robots., , , and . Sci. Robotics, (2019)Telerobotic neurovascular interventions with magnetic manipulation., , , , , , , , , and . Sci. Robotics, (2022)Telerobotically Controlled Magnetic Soft Continuum Robots for Neurovascular Interventions., , , , , , and . ICRA, page 9600-9606. IEEE, (2022)Differential Privacy in Practice., , and . JCSE, 7 (3): 177-186 (2013)Reducing Power Consumption of Mobile Watermarking Application with Energy Refactoring., , , and . HCI (5), volume 10905 of Lecture Notes in Computer Science, page 599-608. Springer, (2018)A development of power consumption measurement system for Android smartphones., , , , and . IMCOM, page 95. ACM, (2017)Preserving source- and sink-location privacy in sensor networks., , and . Comput. Sci. Inf. Syst., 13 (1): 115-130 (2016)