Author of the publication

A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks.

, , , and . IEEE Trans. Network and Service Management, 7 (4): 258-267 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An architecture for secure interoperability between coalition tactical MANETs., , , , , and . MILCOM, page 37-42. IEEE, (2015)LAA: Link-layer anonymous access for tactical MANETs., and . MILCOM, page 1-7. IEEE, (2012)Security Schemes in Vehicular Ad hoc Networks with Cognitive Radios., , , , and . CoRR, (2016)Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning., , , , and . IEEE Trans. Vehicular Technology, 63 (9): 4647-4658 (2014)Securing cognitive radio vehicular Ad hoc networks with trusted lightweight cloud computing., , , , and . CNS, page 450-456. IEEE, (2016)Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks., , , and . IET Commun., 6 (8): 974-983 (2012)Enhancing interoperability in heterogeneous mobile wireless networks for disaster response., , , , and . IEEE Trans. Wirel. Commun., 8 (5): 2424-2433 (2009)A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community., , , and . IEEE Open J. Commun. Soc., (2020)Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks., , , , and . IEEE Trans. Veh. Technol., 60 (3): 1025-1036 (2011)A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions., , , , and . Proc. IEEE, 100 (12): 3172-3186 (2012)