Author of the publication

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis.

, , , and . ISGT, page 1-8. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

System Recovery Concepts in a Distributed Processing System., , , and . ICC (2), page 558-561. Elsevier, (1984)Clustering Household Electricity Use Profiles.. MLSDA@AUS-AI, page 19. ACM, (2013)InkBoard - Tablet PC Enabled Designoriented Learning., , , and . CATE, page 154-160. ACTA Press, (2004)A multi-core numerical framework for characterizing flow in oil reservoirs., , , and . SpringSim (HPC), page 166-174. SCS/ACM, (2011)A malicious activity detection system utilizing predictive modeling in complex environments., , , , , , , and . CCNC, page 371-379. IEEE, (2014)G-NAS: A grid-based approach for negative authentication., , , , , , , and . CICS, page 9-18. IEEE, (2014)An Interoperable Internet Scale Solution for RFID Network Security., , and . ICCCN, page 1-6. IEEE Computer Society, (2009)P3: Privacy preservation protocol for appliance control application., , , and . SmartGridComm, page 294-299. IEEE, (2012)Interoperable internet scale security framework for RFID networks., , and . ICDE Workshops, page 94-99. IEEE Computer Society, (2008)Discerning Industrial Networks, Clusters and Competences - An Alternative View Using Web Mining Techniques., and . PRO-VE, volume 336 of IFIP Advances in Information and Communication Technology, page 279-286. Springer, (2010)