Author of the publication

Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network.

, , , and . IAS, page 43-49. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol., , and . NCM (2), page 198-201. IEEE Computer Society, (2008)978-0-7695-3322-3.Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves., , , and . Selected Areas in Cryptography, volume 3897 of Lecture Notes in Computer Science, page 205-220. Springer, (2005)Decentralized Hybrid Wireless Mesh Protocol., and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 824-829. ACM, (2009)A Secure DRM Framework for User's Domain and Key Management., , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 420-429. Springer, (2007)A Privacy Preserving Security Protocol-Based Application for Wireless Communication System., , , and . HPCC/CSS/ICESS, page 1651-1656. IEEE, (2015)Throughput Analysis of Wireless Mesh Network Test-Bed., , , and . ICHIT (2), volume 206 of Communications in Computer and Information Science, page 54-61. Springer, (2011)Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks., , and . KSII Trans. Internet Inf. Syst., 8 (6): 1982-2004 (2014)Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol., , and . IACR Cryptology ePrint Archive, (2007)Secure Deniable Authenticated Key Establishment for Internet Protocols., , , and . IACR Cryptology ePrint Archive, (2007)Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol., , and . ICISS, volume 4812 of Lecture Notes in Computer Science, page 64-76. Springer, (2007)