Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange., , , and . J. Comput. Sci. Technol., 23 (3): 377-388 (2008)Data representations for in-situ exploration of health and fitness data., , , and . PervasiveHealth, page 163-172. ACM, (2017)Performance of Key Distribution in 802.15.4 Beacon Enabled Cluster., , and . WCNC, page 4354-4359. IEEE, (2007)On Security Attacks in HealthcareWSNs Implemented on 802.15.4 Beacon Enabled Clusters., , and . CCNC, page 741-745. IEEE, (2007)Performance implications of periodic key exchanges and packet integrity overhead in an 802.15.4 beacon enabled cluster., , and . Int. J. Sens. Networks, 3 (1): 33-42 (2008)Revisiting Crisis Maps with Geo-temporal Tag Visualization., , and . PacificVis, page 177-184. IEEE Computer Society, (2014)The Cost of Security: Performance of ZigBee Key Exchange Mechanism in an 802.15.4 Beacon Enabled Cluster., , , and . MASS, page 876-881. IEEE Computer Society, (2006)Key Exchange in 802.15.4 Networks and Its Performance Implications., , and . MSN, volume 4325 of Lecture Notes in Computer Science, page 497-508. Springer, (2006)IEEE 802.15.4: Signature-Based Intrusion Detection in Wireless Sensor Networks (WSNs)., , and . Encyclopedia of Wireless and Mobile Communications, (2008)The Impact of Interactivity on Comprehending 2D and 3D Visualizations of Movement Data., , , , , and . IEEE Trans. Vis. Comput. Graph., 21 (1): 122-135 (2015)