Author of the publication

A Secure Hierarchical Key Management Scheme in Wireless Sensor Network.

, , , , and . Int. J. Distributed Sens. Networks, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic Spectrum Allocation Algorithm for a Maritime Cognitive Radio Communication System Based on a Queuing Model., , , and . Information, 8 (4): 119 (2017)FlashTier: a lightweight, consistent and durable storage cache., , and . EuroSys, page 267-280. ACM, (2012)Elite archives-driven particle swarm optimization for large scale numerical optimization and its engineering applications.. Swarm Evol. Comput., (2023)Warming up storage-level caches with bonfire., , , , , , and . FAST, page 59-72. USENIX, (2013)A DDoS Attack Detection Method Based on LSTM Neural Network in The Internet of Vehicles., , , , , and . ICITEE, page 60:1-60:5. ACM, (2021)Mira: A Program-Behavior-Guided Far Memory System., , and . SOSP, page 692-708. ACM, (2023)An Intelligent Recommendation Method for Power Big Data Based on Knowledge Graph., , , and . ISCAS, page 1-5. IEEE, (2021)VRLifeTime - An IDE Tool to Avoid Concurrency and Memory Bugs in Rust., , , , and . CCS, page 2085-2087. ACM, (2020)Warped Mirrors for flash., , and . MSST, page 1-12. IEEE Computer Society, (2013)Application of Internet of Things in Smart Grid Power Transmission., , , , and . MUSIC, page 96-100. IEEE, (2012)