Author of the publication

Secure data aggregation algorithms for sensor networks in the presence of collusion attacks.

, and . PerCom Workshops, page 1-6. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Broadcasting on the Star Graph., and . IEEE Trans. Parallel Distributed Syst., 3 (4): 389-396 (1992)Modeling full-length video using Markov-modulated gamma-based framework., , and . GLOBECOM, page 1979-1983. IEEE, (2001)Bandwidth estimation for multiplexed videos using MMG-based single video traffic model., , , and . GLOBECOM, page 3564-3568. IEEE, (2003)Call admission control in mobile cellular CDMA systems using fuzzy associative memory., and . ICC, page 4082-4086. IEEE, (2004)Single Sign-on Implementation: Leveraging Browser Storage for Handling Tabbed Browsing Sign-outs., and . MICRADS, volume 152 of Smart Innovation, Systems and Technologies, page 15-28. Springer, (2019)cmpRTCP: Concurrent Multi-Path Real-Time TCP., and . GLOBECOM, page 2031-2036. IEEE, (2007)Consensus in the Presence of Multiple Opinion Leaders: Effect of Bounded Confidence., , , and . CoRR, (2016)A New Technique for Lossless Compression of Color Images Based on Hierarchical Prediction, Inversion and Context Adaptive Coding., , , and . DCC, page 584. IEEE, (2019)Reflexive Incidence Matrix (RIM) Representation of Petri Nets., , , , and . IEEE Trans. Software Eng., 13 (6): 643-653 (1987)On multiple connectedness of regions visible due to multiple diffuse reflections, and . CoRR, (2003)