Author of the publication

Key Management for Static Wireless Sensor Networks With Node Adding.

, , and . IEEE Trans. Ind. Informatics, 10 (2): 1133-1143 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Recoverability in Wireless Sensor Networks., and . IEEE Access, (2019)Hierarchical Key Negotiation Technique for Transitory Master Key Schemes in Wireless Sensor Networks., , and . BWCCA, page 151-157. IEEE, (2013)Mixed public and secret-key cryptography for wireless sensor networks., , and . ICMU, page 1-6. IEEE, (2017)Random key pre-distribution with transitory master key for wireless sensor networks., , and . StudentWorkshop@CoNEXT, page 27-28. ACM, (2009)Degree Distribution of Unit Disk Graphs with Uniformly Deployed Nodes on a Rectangular Surface., and . BWCCA, page 255-262. IEEE Computer Society, (2011)An Algorithmic and Architectural Study on Montgomery Exponentiation in RNS., , , , and . IEEE Trans. Computers, 61 (8): 1071-1083 (2012)Key Management for Static Wireless Sensor Networks With Node Adding., , and . IEEE Trans. Ind. Informatics, 10 (2): 1133-1143 (2014)A Fair and High Throughput Reader-to-Reader Anticollision Protocol in Dense RFID Networks., , , and . IEEE Trans. Ind. Informatics, 8 (3): 697-706 (2012)Quantum Pliers Cutting the Blockchain., , , , and . IT Prof., 22 (6): 90-96 (2020)Trade-off between maximum cardinality of collision sets and accuracy of RFID reader-to-reader collision detection., , , , and . EURASIP J. Embed. Syst., (2013)