Author of the publication

Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks

, , , and . Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks, , and . IEEE International Conference on Communications, Seoul, Korea, ICC2005, (May 2005)WSNs on the Road for Automobiles, , , and . Presentation, (March 2005)13th Wireless World Reseach Forum, Jeju Island, Korea.Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets., and . CECC, page 16:1-16:6. ACM, (2019)Secure Comparison of Encrypted Data in Wireless Sensor Networks, , and . 3rd Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Trentino, Italy, WiOpt2005, (April 2005)Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks, , and . IEEE International Conference on Communications, Istanbul, Turkey, ICC2006, (June 2006)A Survey on the Encryption of Convergecast-Traffic with In-Network Processing, , and . IEEE Transactions on Dependable and Secure Computing, (2008)to appear.Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution and Routing Adaptation, , and . IEEE Transactions on Mobile Computing, (2006)A ROM-friendly Secure Code Update mechanism for WSNs using a stateful-verifier T-time Signature Scheme, , and . ACM Conference on Wireless Security, WiSec'09, ACM, (2009)to appear.Security Solutions for Wireless Sensor Networks, , and . NEC Journal of Advanced Technology, (June 2006)Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks, , , and . Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, (2006)