Author of the publication

A Trusted Routing Based Service Discovery Protocol with Backup Nodes in MANETs.

, , , and . WOSIS, page 115-122. SciTePress, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Effective Privacy-Preserving RFID Scheme against Desynchronization.. IIH-MSP, page 659-662. IEEE Computer Society, (2007)A Novel Dynamic ID-based Remote User Authentication and Access Control Scheme for Multi-server Environment., and . CIT, page 1102-1107. IEEE Computer Society, (2010)Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANET., , and . CIT, page 1627-1632. IEEE Computer Society, (2010)A transactional-cycle approach to evidence management for dispute resolution., , and . Inf. Manag., 42 (4): 607-618 (2005)A Novel Approach to Dynamic ID-Based Remote User Authentication Scheme for Multi-server Environment., and . NSS, page 548-553. IEEE Computer Society, (2010)A study on secure and fair escrow services for digital commerce., and . NCM, page 396-401. IEEE Computer Society, (2010)A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party.. TrustBus, volume 4657 of Lecture Notes in Computer Science, page 44-53. Springer, (2007)A Trusted Routing Based Service Discovery Protocol with Backup Nodes in MANETs., , , and . WOSIS, page 115-122. SciTePress, (2011)Establishing Chain of Evidence as a Base for Non-Repudiation Services., , and . SEC, volume 250 of IFIP Conference Proceedings, page 49-60. Kluwer, (2003)Trust-Aware Anonymous and Efficient Routing for Mobile Ad-Hoc Networks., and . WOSIS, page 132-137. INSTICC Press, (2008)