Author of the publication

Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication.

, , and . ISA, volume 76 of Communications in Computer and Information Science, page 198-208. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks., , , , and . IJDSN, (2014)Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks., , , and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 1-11. Springer, (2007)An efficient key distribution scheme for heterogeneous sensor networks., , and . IWCMC, page 388-392. ACM, (2007)An efficient collusion resistant security mechanism for heterogeneous sensor networks., , , and . Internet Res., 19 (2): 227-245 (2009)Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet., and . ITCC (1), page 17-21. IEEE Computer Society, (2004)Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol., , and . NBiS, page 260-267. IEEE Computer Society, (2009)Key Management and Secure Routing in Heterogeneous Sensor Networks., , and . WiMob, page 549-554. IEEE Computer Society, (2008)Scalable and efficient key management for heterogeneous sensor networks., , , and . J. Supercomput., 45 (1): 44-65 (2008)A Key Management Scheme Based on Random Key Distribution for Clustered Wireless Sensor Networks., and . IMECS, page 1395-1400. Newswood Limited, (2007)A Review of Cryptanalytic Attacks on E-STREAM Submitted Stream Ciphers., and . IMECS, page 406-411. Newswood Limited, (2007)