Author of the publication

Efficient Vector-Based Forwarding for Underwater Sensor Networks.

, , , , , and . EURASIP J. Wireless Comm. and Networking, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements., , , and . IEEE Communications Magazine, 54 (2): 32-38 (2016)Enhanced Side-Channel Cube Attacks on PRESENT., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 332-339 (2013)Secure Over-The-Air Firmware Updates for Sensor Networks., , , , , , and . MASS Workshops, page 97-100. IEEE, (2019)MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation., , , , , , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 231-248. Springer, (2012)An Output Probabilistic Constrained Optimal Control Algorithm Based on Multivariable MAC and its Application in Looper Control System., , and . IEEE Access, (2019)Accelerating higher-order masking of AES using composite field and SIMD., , , and . ISSPIT, page 575-580. IEEE Computer Society, (2015)A resilient pressure routing scheme for underwater acoustic networks., , , and . GLOBECOM, page 637-642. IEEE, (2014)Efficient multipath communication for time-critical applications in underwater acoustic sensor networks., , , and . IEEE/ACM Trans. Netw., 19 (1): 28-41 (2011)Single-Cycle Bit Permutations with MOMR Execution., , and . J. Comput. Sci. Technol., 20 (5): 577-585 (2005)ChainSplitter: Towards Blockchain-Based Industrial IoT Architecture for Supporting Hierarchical Storage., , , and . Blockchain, page 166-175. IEEE, (2019)