Author of the publication

A scalable multicast key management scheme for heterogeneous wireless networks.

, , and . IEEE/ACM Trans. Netw., 12 (4): 653-666 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis., and . SocialCom/PASSAT, page 65-72. IEEE Computer Society, (2010)Risk-Aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid., , , and . GLOBECOM, page 1-6. IEEE, (2011)Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes., , and . IEEE Trans. Dependable Sec. Comput., 4 (3): 228-242 (2007)Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis., , , and . IEEE Trans. Information Forensics and Security, 8 (6): 936-948 (2013)A joint channel estimation and unequal error protection scheme for video transmission in OFDM systems., , and . ICIP (1), page 549-552. IEEE, (2002)Channel aware unequal error protection for image transmission over broadband wireless LAN., , and . ICIP (1), page 93-96. IEEE, (2003)JET: dynamic join-exit-tree amortization and scheduling for contributory key management., , , and . IEEE/ACM Trans. Netw., 14 (5): 1128-1140 (2006)Attack-proof collaborative spectrum sensing in cognitive radio networks., , , and . CISS, page 130-134. IEEE, (2009)Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems., , and . SocialCom/PASSAT, page 425-434. IEEE, (2011)FiberID: molecular-level secret for identification of things., , , and . WIFS, page 84-88. IEEE, (2014)