Author of the publication

Critical Issues in Trust Management for Mobile Ad-Hoc Networks.

, , , and . IRI, page 97-100. IEEE Systems, Man, and Cybernetics Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classifying high dimensional data by interactive visual analysis., , , and . J. Vis. Lang. Comput., (2016)Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices., , , , , , and . IEEE J. Biomed. Health Informatics, 23 (4): 1546-1557 (2019)Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations., , , , , , , , and . IEEE Access, (2019)Security services and public key infrastructure for ATM networks., , and . LCN, page 253-262. IEEE Computer Society, (1997)A trust management architecture for hierarchical wireless sensor networks., , , , and . LCN, page 264-267. IEEE Computer Society, (2010)Critical Issues in Trust Management for Mobile Ad-Hoc Networks., , , and . IRI, page 97-100. IEEE Systems, Man, and Cybernetics Society, (2009)Interactive Visual Classification of Multivariate Data., , , and . ICMLA (2), page 246-251. IEEE, (2012)978-1-4673-4651-1.Security Issues in Asynchronous Transfer Mode., , and . ACISP, volume 1270 of Lecture Notes in Computer Science, page 76-89. Springer, (1997)Joint Power Control and Resource Allocation Mode Selection for Safety-Related V2X Communication., , , , and . IEEE Trans. Vehicular Technology, 68 (8): 7970-7986 (2019)A comparison of key distribution schemes using fuzzy commitment and fuzzy vault within wireless body area networks., , , and . PIMRC, page 2120-2125. IEEE, (2015)