Author of the publication

Self Adjusted Security Architecture for Mobile Ad Hoc Networks (MANETs).

, , , and . ACIS-ICIS, page 682-687. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FedREP: Towards Horizontal Federated Load Forecasting for Retail Energy Providers., , , , , and . CoRR, (2022)Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism., , , , , , and . CoRR, (2022)Special issue on Underwater Acoustic Sensor Networks: Emerging trends and current perspectives., , and . J. Netw. Comput. Appl., (2017)EEG-based emotion recognition via capsule network with channel-wise attention and LSTM models., , , and . CCF Trans. Pervasive Comput. Interact., 3 (4): 425-435 (2021)LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)., , , , , and . Comput. Secur., (2021)A hybrid cyber defense framework for reconnaissance attack in industrial control systems., , , and . Comput. Secur., (January 2024)An Efficient Dynamic Group-Based Batch Verification Scheme for Vehicular Sensor Networks., , , , , and . FNSS, volume 1113 of Communications in Computer and Information Science, page 52-64. Springer, (2019)Protean Authentication Scheme - A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments., , , and . IEEE Access, (2019)Portguard - an authentication tool for securing ports in an IoT gateway., , , and . PerCom Workshops, page 624-629. IEEE, (2017)A minimum disclosure approach to authentication and privacy in RFID systems., , , , and . Comput. Networks, 56 (15): 3401-3416 (2012)