Author of the publication

LBKERS: A New Efficient Key Management Scheme for Wireless Sensor Networks.

, , , , and . MSN, volume 4864 of Lecture Notes in Computer Science, page 772-783. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Real-time Privacy Amplification Scheme in QKD System., , , and . J. Univers. Comput. Sci., 19 (16): 2420-2436 (2013)An Event Grouping Approach for Infinite Stream with Differential Privacy., , , and . APSCC, volume 10065 of Lecture Notes in Computer Science, page 106-116. (2016)OpenSAN: a software-defined satellite network architecture., , , , , and . SIGCOMM, page 347-348. ACM, (2014)ERID: A Deep Learning-based Approach Towards Efficient Real-Time Intrusion Detection for IoT., , and . COMNET, page 1-7. IEEE, (2020)Removing Key Escrow from the LW-HIBE Scheme., , , , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 593-605. Springer, (2015)Exploring the Gateway-Based Distributed Location Management Schemes in LEO Satellite Networks., , , , , and . IEICE Trans. Commun., 101-B (3): 825-834 (2018)ISL Reassignment Based Snapshot Routing Optimization for Polar-Orbit LEO Satellite Networks., , , , , , and . IEICE Trans. Commun., 98-B (9): 1896-1905 (2015)An Efficient Unsavory Data Detection Method for Internet Big Data., , , , , and . ICT-EurAsia/CONFENIS, volume 9357 of Lecture Notes in Computer Science, page 213-220. Springer, (2015)A Loop-Based Key Management Scheme for Wireless Sensor Networks., , , , and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 103-114. Springer, (2007)A Novel Resource-Efficient Privacy Amplification Scheme: Towards Ground-Satellite Quantum Key Distribution Post-processing., , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 336-346. Springer, (2014)