Author of the publication

Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks.

, , , and . Secur. Commun. Networks, 5 (12): 1363-1374 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge., , , and . IJDSN, (2015)A Novel Threshold Changeable Secret Image Sharing Scheme., , , , , and . Symmetry, 13 (2): 286 (2021)A New Low-BMR Quantization Method for Wireless Channel Characteristics-based Secret Key Generation., , , and . KSII Trans. Internet Inf. Syst., 11 (10): 5080-5097 (2017)MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols., , , , , , , and . Sensors, 20 (18): 5194 (2020)SPS and DPS: Two New Grid-Based Source Location Privacy Protection Schemes in Wireless Sensor Networks., , , and . Sensors, 19 (9): 2074 (2019)A Heterogeneous Network Modeling Method Based on Public Goods Game Theory to Explore Cooperative Behavior in VANETs., , , and . Sensors, 20 (6): 1802 (2020)Analysis of the information theoretically secret key agreement by public discussion., , , , , and . Secur. Commun. Networks, 8 (15): 2507-2523 (2015)SBAC: A secure blockchain-based access control framework for information-centric networking., , , , , and . J. Netw. Comput. Appl., (2020)Optimal Selfish Mining-Based Denial-of-Service Attack., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)SDoS: Selfish Mining-Based Denial-of-Service Attack., , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)