Author of the publication

A Trust-Based Routing Protocol for Ad Hoc Networks.

, , and . MWCN, volume 162 of IFIP, page 251-262. Kluwer/Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review., , , , , and . Sensors, 21 (24): 8415 (2021)A Formal Verification Approach to Handle Attack Graphs., , , , and . ICAART (3), page 125-132. SCITEPRESS, (2024)Formal Analysis of Secure Device Pairing Protocols., and . NCA, page 291-295. IEEE Computer Society, (2014)Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and Their Mitigation., , , and . ICSBT/SECRYPT (Revised Selected Papers), volume 1849 of Communications in Computer and Information Science, page 122-155. Springer, (2022)Obstruction Alternating-time Temporal Logic: A Strategic Logic to Reason about Dynamic Models., , , and . AAMAS, page 271-280. ACM, (2024)A Trust-Based Routing Protocol for Ad Hoc Networks., , and . MWCN, volume 162 of IFIP, page 251-262. Kluwer/Springer, (2004)A secure and effective device pairing protocol., and . CCNC, page 507-512. IEEE, (2015)A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization., , , and . ACM Comput. Surv., 51 (5): 90:1-90:31 (2019)Authenticated and Privacy-Preserving Consent Management in the Internet of Things., , , and . ANT/EDI40, volume 151 of Procedia Computer Science, page 256-263. Elsevier, (2019)Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things., , , , and . M4IoT@Middleware, page 35-40. ACM, (2018)