Author of the publication

Wireless sensor network key management survey and taxonomy.

, and . J. Netw. Comput. Appl., 33 (2): 63-75 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Frame Relay Service., and . Computer Networks and ISDN Systems, 26 (12): 1539-1558 (1994)Gestion efficace de la sécurité des communications de groupe pour le service SSM., , , and . Technique et Science Informatiques, 23 (9): 1107-1135 (2004)A Policy based Security Architecture for Software Defined Networks., , , and . CoRR, (2018)Trust management towards service-oriented applications., , , and . Serv. Oriented Comput. Appl., 3 (2): 129-146 (2009)Fine-Grained Access Control for Smart Healthcare Systems in the Internet of Things., , , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 4 (13): e5 (2018)Security enhanced mobile agents.. ACM Conference on Computer and Communications Security, page 200-209. ACM, (2000)Trustworthy Computing (Extended Abstract).. WISE, volume 3306 of Lecture Notes in Computer Science, page 13-16. Springer, (2004)Fail-Stop Confirmer Signatures., and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 368-377. Springer, (2000)Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples., and . CoRR, (2019)MobileTrust: a trust enhanced security architecture for mobile agent systems., and . Int. J. Inf. Sec., 9 (3): 153-178 (2010)