Author of the publication

Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks.

, , , and . PRDC, page 99-108. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks., , and . Concurr. Comput. Pract. Exp., (2019)Poster: Multi-Layer Threat Analysis of the Cloud., , , and . CCS, page 3419-3421. ACM, (2022)Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes., , and . SAC, page 184-193. ACM, (2021)Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages., , , , , , and . SEFM, volume 11724 of Lecture Notes in Computer Science, page 471-490. Springer, (2019)A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks., , and . ACM Trans. Internet Things, 2 (1): 4:1-4:32 (2020)ThreatPro: Multi-Layer Threat Analysis in the Cloud., , , and . CoRR, (2022)Throughput Aware Authentication Prioritisation for Vehicular Communication Networks., , , and . VTC Fall, page 1-5. IEEE, (2019)Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things., , , , , and . ACM Trans. Sens. Networks, 18 (2): 29:1-29:41 (2022)Privacy Challenges With Protecting Live Vehicular Location Context., , , , and . IEEE Access, (2020)Near optimal routing protocols for source location privacy in wireless sensor networks: modelling, design and evaluation.. University of Warwick, Coventry, UK, (2018)British Library, EThOS.