Author of the publication

A Wireless Security Framework without Shared Secrets.

, and . SSS, volume 5873 of Lecture Notes in Computer Science, page 609-623. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capabilities of Low-Power Wireless Jammers., and . INFOCOM, page 2551-2555. IEEE, (2009)Spatial Signatures for Lightweight Security in Wireless Sensor Networks., and . INFOCOM, page 2137-2145. IEEE, (2008)VCSTC: Virtual Cyber Security Testing Capability - An Application Oriented Paradigm for Network Infrastructure Protection., , , , , and . TestCom/FATES, volume 5047 of Lecture Notes in Computer Science, page 119-134. Springer, (2008)Dialog codes for secure wireless communications., and . IPSN, page 13-24. IEEE Computer Society, (2009)Comparison of Data-driven Link Estimation Methods in Low-power Wireless Networks., , and . SECON, page 1-9. IEEE, (2009)Speaker recognition system in multi-channel environment., , and . SMC, page 3116-3121. IEEE, (2003)Automatic speaker recognition using dynamic Bayesian network., , , and . ICME, page 613-616. IEEE Computer Society, (2003)Bimodal Speaker Identification Using Dynamic Bayesian Network., , , and . SINOBIOMETRICS, volume 3338 of Lecture Notes in Computer Science, page 577-585. Springer, (2004)QoS supported efficient clustered query processing in large collaboration of heterogeneous sensor networks., and . CTS, page 242-249. IEEE Computer Society, (2009)On the convergence and stability of data-driven link estimation and routing in sensor networks., , and . ACM Trans. Auton. Adapt. Syst., 4 (3): 18:1-18:29 (2009)