Author of the publication

Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication.

, , , and . IEEE Access, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions., , , , , and . Sensors, 22 (23): 9063 (2022)Learning a deep-feature clustering model for gait-based individual identification., , , , and . Comput. Secur., (January 2024)Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication., , , and . IEEE Access, (2022)Anomaly detection for Internet worms., and . Integrated Network Management, page 133-146. IEEE, (2005)Matching game theoretical model for stable relay selection in a UAV-assisted internet of vehicles., , , , and . Veh. Commun., (2021)Blockchain-Based Solution for the Administration of Controlled Medication., , , , , and . IEEE Access, (2021)Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices., , , , , and . IEEE Access, (2022)Popularity-Based Video Caching Techniques for Cache-Enabled Networks: A Survey., , , , , and . IEEE Access, (2019)IoT Applications: From Mobile Agents to Microservices Architecture., , , , and . IIT, page 117-122. IEEE, (2018)Coverage and Energy Analysis of Mobile Sensor Nodes in Obstructed Noisy Indoor Environment: A Voronoi-Approach., , , , , and . IEEE Trans. Mob. Comput., 21 (8): 2745-2760 (2022)