Author of the publication

A robust group-based key management scheme for wireless sensor networks.

, and . WCNC, page 1915-1920. IEEE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximate membership query over time-decaying windows for event stream processing., , and . DEBS, page 44-47. ACM, (2012)A dynamic en-route scheme for filtering false data injection in wireless sensor networks., and . SenSys, page 294-295. ACM, (2005)Identifying high-cardinality hosts from network-wide traffic measurements., , and . CNS, page 287-295. IEEE, (2013)A lightweight authentication protocol for access control in IEEE 802.11., , and . GLOBECOM, page 1384-1388. IEEE, (2003)Design and Test of an In-Vivo Robotic Camera Integrated with Optimized Illumination System for Single-port Laparoscopic Surgery., , , , , and . ICRA, page 1392-1397. IEEE, (2018)MicroTEE: Designing TEE OS Based on the Microkernel Architecture., , , , and . TrustCom/BigDataSE, page 26-33. IEEE, (2019)Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness., , , , , , and . SADFE, page 1-3. IEEE Computer Society, (2011)A fast sketch for aggregate queries over high-speed network traffic., , and . INFOCOM, page 2741-2745. IEEE, (2012)Lightweight Mutual Authentication and Ownership Transfer for RFID Systems., , , and . INFOCOM, page 251-255. IEEE, (2010)Cardinality change-based early detection of large-scale cyber-attacks., , and . INFOCOM, page 1788-1796. IEEE, (2013)