Author of the publication

Content-location based key management scheme for content centric networks.

, and . SIN, page 376-379. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Authentication and Key Management Scheme for Wireless Sensor Networks., and . S-CUBE, volume 143 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 51-60. Springer, (2014)Improving Smartphones Battery Life by Reducing Energy Waste of Background Applications., , , and . NGMAST, page 123-130. IEEE, (2014)Sensors Faults Classification and Faulty Signals Reconstruction Using Deep Learning., , , , , and . IEEE Access, (2024)Content-location based key management scheme for content centric networks., and . SIN, page 376-379. ACM, (2013)Design of Home Energy Gateway boosting the development of Smart Grid applications at Home., , , and . ICEAC, page 103-108. IEEE, (2013)A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems., , , , and . ISGT, page 1-5. IEEE, (2020)Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play., , , and . Future Internet Assembly, volume 7858 of Lecture Notes in Computer Science, page 323-335. Springer, (2013)SEAL: Semantically Enriched Authoring in LATEX - A Model for Scientific Discourse., , , , , and . IEEE Access, (2022)Cybersecurity Engineering: Bridging the Security Gaps in Advanced Automotive Systems and ISO/SAE 21434., , , , , , and . VTC2023-Spring, page 1-6. IEEE, (2023)Poshida II, a Multi Group Distributed Peer to Peer Protocol for Private Web Search., , and . FIT, page 75-80. IEEE Computer Society, (2016)