Author of the publication

Secure authenticated group key agreement protocol in the MANET environment.

, , , and . Inf. Secur. Tech. Rep., 13 (3): 158-164 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient sensor node authentication via 3GPP mobile communication networks., , , and . ACM Conference on Computer and Communications Security, page 687-689. ACM, (2010)Efficient mobile sensor authentication in smart home and WPAN., , and . IEEE Trans. Consumer Electronics, 56 (2): 591-596 (2010)Prevention of information mis-translation by a malicious gateway in connected vehicles., and . PST, page 247-254. IEEE, (2016)Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments., , , and . Comput. Secur., (December 2023)Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security., , and . IEICE Trans. Commun., 94-B (8): 2235-2238 (2011)Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies., , and . IEICE Trans. Inf. Syst., 94-D (6): 1181-1184 (2011)Ensuring Safety and Security in CAN-Based Automotive Embedded Systems: A Combination of Design Optimization and Secure Communication., , and . IEEE Trans. Veh. Technol., 69 (7): 7078-7091 (2020)On authentication in a connected vehicle: secure integration of mobile devices with vehicular networks., , and . ICCPS, page 160-169. ACM, (2013)A Study on Employing UPTANE for Secure Software Update OTA in Drone Environments., and . COINS, page 1-6. IEEE, (2022)Efficient sensor node authentication in third generation-wireless sensor networks integrated networks., , , and . IET Commun., 5 (12): 1744-1754 (2011)