Author of the publication

Efficient sensor node authentication in third generation-wireless sensor networks integrated networks.

, , , and . IET Commun., 5 (12): 1744-1754 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prevention of information mis-translation by a malicious gateway in connected vehicles., and . PST, page 247-254. IEEE, (2016)Efficient sensor node authentication via 3GPP mobile communication networks., , , and . ACM Conference on Computer and Communications Security, page 687-689. ACM, (2010)Efficient mobile sensor authentication in smart home and WPAN., , and . IEEE Trans. Consumer Electronics, 56 (2): 591-596 (2010)Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments., , , and . Comput. Secur., (December 2023)Ensuring Safety and Security in CAN-Based Automotive Embedded Systems: A Combination of Design Optimization and Secure Communication., , and . IEEE Trans. Veh. Technol., 69 (7): 7078-7091 (2020)Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security., , and . IEICE Trans. Commun., 94-B (8): 2235-2238 (2011)Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies., , and . IEICE Trans. Inf. Syst., 94-D (6): 1181-1184 (2011)On authentication in a connected vehicle: secure integration of mobile devices with vehicular networks., , and . ICCPS, page 160-169. ACM, (2013)A Study on Employing UPTANE for Secure Software Update OTA in Drone Environments., and . COINS, page 1-6. IEEE, (2022)A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication., , , , and . Int. J. Commun. Syst., 24 (4): 461-472 (2011)