Author of the publication

Secure Position-Based Selecting Scheme for WSN Communication.

, , and . CN, volume 160 of Communications in Computer and Information Science, page 386-397. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks., , and . CN, volume 79 of Communications in Computer and Information Science, page 280-289. Springer, (2010)Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML., and . CSS, volume 448 of Communications in Computer and Information Science, page 178-192. Springer, (2014)Adaptive Approach to Network Security., , and . CN, volume 39 of Communications in Computer and Information Science, page 233-241. Springer, (2009)Voter non-repudiation oriented scheme for the medium scale e-voting protocol., and . IMCSIT, page 325-330. IEEE, (2009)A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks., and . SECRYPT, page 728-733. SCITEPRESS, (2021)Secure and Reliable Localization in Wireless Sensor Network Based on RSSI Mapping., , , and . CN, volume 718 of Communications in Computer and Information Science, page 55-69. Springer, (2017)On Scalable Security Audit for Web Application According to ISO 27002., and . CN, volume 160 of Communications in Computer and Information Science, page 289-297. Springer, (2011)A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment., , and . FedCSIS, volume 15 of Annals of Computer Science and Information Systems, page 391-395. (2018)On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML)., , and . Ann. UMCS Informatica, 12 (4): 69-81 (2012)How to Train People to Increase Their Security Awareness in IT., , , and . MUE/FutureTech, volume 448 of Lecture Notes in Electrical Engineering, page 12-17. (2017)