From post

A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study.

, , , , , и . IEEE Trans. Veh. Technol., 58 (1): 398-408 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling and Evaluation of Homing-Pigeon Based Delay Tolerant Networks with Periodic Scheduling., , и . ICC, стр. 1-5. IEEE, (2009)On the Optimal Linear Network Coding Design for Information Theoretically Secure Unicast Streaming., , , , и . IEEE Trans. Multim., 18 (6): 1149-1162 (2016)Energy Efficient Robust Beamforming and Cooperative Jamming Design for IRS-Assisted MISO Networks., , , и . CoRR, (2020)Second-Order Fine-Tuning without Pain for LLMs: A Hessian Informed Zeroth-Order Optimizer., , , , , и . CoRR, (2024)Computation Rate Maximization in UAV-Enabled Wireless Powered Mobile-Edge Computing Systems., , , и . CoRR, (2018)An efficient security protocol for advanced metering infrastructure in smart grid., , , , и . IEEE Netw., 27 (4): 1-0 (2013)Vehicle Safety Improvement through Deep Learning and Mobile Sensing., , , , и . IEEE Netw., 32 (4): 28-33 (2018)An adaptive security protocol for a wireless sensor-based monitoring network in smart grid transmission lines., , , , , и . Secur. Commun. Networks, 9 (1): 60-71 (2016)Artificial frequency selective channel for covert cyclic delay diversity orthogonal frequency division multiplexing transmission., , и . Secur. Commun. Networks, 8 (9): 1707-1716 (2015)Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning., , , и . IEEE Trans. Inf. Forensics Secur., (2022)