Author of the publication

How to get Group key efficiently in mobile ad hoc networks?

, , and . MILCOM, page 1009-1014. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Supervised Anonymous Issuance Scheme of Central Bank Digital Currency Based on Blockchain., , and . ICA3PP (3), volume 12454 of Lecture Notes in Computer Science, page 475-493. Springer, (2020)How to get Group key efficiently in mobile ad hoc networks?, , and . MILCOM, page 1009-1014. IEEE, (2015)Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice., and . ICISC, volume 13218 of Lecture Notes in Computer Science, page 137-156. Springer, (2021)Performance Study on the MPMS Fabric: A Novel Parallel and Distributed Switching System Architecture., , , , and . HPCC, page 69-76. IEEE Computer Society, (2008)Compensation Buffer Sizing for Providing User-Level QoS Guarantee of Media Flows., , , and . ICC, page 90-94. IEEE, (2008)Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper)., , , and . ICICS, volume 4307 of Lecture Notes in Computer Science, page 546-555. Springer, (2006)Design Universal Security Scheme for Broadband Router., and . Int. J. Netw. Secur., 10 (2): 81-86 (2010)Enforcing ACL Access Control on Android Platform., , , , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 366-383. Springer, (2017)An Efficient Conference Key Updating Scheme with the Knowledge of Group Dynamics., , , and . GLOBECOM, page 1820-1825. IEEE, (2008)PIV4DB: Probabilistic Integrity Verification for Cloud Database., , , , and . ISCC, page 1-7. IEEE, (2020)