Author of the publication

A Trust-Based Routing Protocol for Ad Hoc Networks.

, , and . MWCN, volume 162 of IFIP, page 251-262. Kluwer/Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review., , , , , and . Sensors, 21 (24): 8415 (2021)Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and Their Mitigation., , , and . ICSBT/SECRYPT (Revised Selected Papers), volume 1849 of Communications in Computer and Information Science, page 122-155. Springer, (2022)A Formal Verification Approach to Handle Attack Graphs., , , , and . ICAART (3), page 125-132. SCITEPRESS, (2024)Formal Analysis of Secure Device Pairing Protocols., and . NCA, page 291-295. IEEE Computer Society, (2014)Attack Graphs & Subset Sabotage Games., , and . Intelligenza Artificiale, 17 (1): 77-88 (2023)Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols., , and . Peer-to-Peer Netw. Appl., 5 (3): 231-243 (2012)Reasoning about Moving Target Defense in Attack Modeling Formalisms., , , and . MTD@CCS, page 55-65. ACM, (2022)A Game Theoretic Approach to Attack Graphs., , , , and . ICAART (1), page 347-354. SCITEPRESS, (2023)Questioning the security and efficiency of the ESIoT approach., , , , and . WISEC, page 202-207. ACM, (2018)A Trust-Based Routing Protocol for Ad Hoc Networks., , and . MWCN, volume 162 of IFIP, page 251-262. Kluwer/Springer, (2004)