Author of the publication

On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability.

, , , , and . Peer-to-Peer Netw. Appl., 7 (3): 255-273 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and provably secure password-based group key agreement protocol., , , and . Comput. Stand. Interfaces, 31 (5): 948-953 (2009)Studies of grinding depth and Influential Factors for Concrete pipe Port-grinding robots., , , and . Int. J. Robotics Autom., (2020)A Risk-Aware Reputation Mechanism for Resource Sharing on Grids., , and . CIT (1), page 223-227. IEEE Computer Society, (2009)An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs., , and . Wirel. Pers. Commun., 77 (1): 383-394 (2014)A novel Group Key Transfer Protocol., , , and . IACR Cryptol. ePrint Arch., (2012)A fair e-cash payment scheme based on credit., , and . ICEC, volume 113 of ACM International Conference Proceeding Series, page 622-626. ACM, (2005)Research on Robot Classifiable Grasp Detection Method Based on Convolutional Neural Network., , , and . ICIRA (3), volume 13015 of Lecture Notes in Computer Science, page 705-715. Springer, (2021)Kinematics Dexterity Analysis and Optimization of 4-UPS-UPU Parallel Robot Manipulator., , , and . ICIRA (2), volume 8918 of Lecture Notes in Computer Science, page 1-11. Springer, (2014)Vibration Test and Analysis of a Six-Degree-of-Freedom Cooperative Robot Manipulator End., , , , and . ICIRA (2), volume 13014 of Lecture Notes in Computer Science, page 374-383. Springer, (2021)On a Session Key Compromise Problem in KC95 protocol., , and . ACM SIGOPS Oper. Syst. Rev., 34 (3): 16-18 (2000)