From post

Elliptic Curve Based Cybersecurity Schemes for Publish-Subscribe Internet of Things.

, , и . QSHINE, том 199 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 258-268. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The case for a dynamic proxy framework with voluntary/incentive-based client hosting scheme., , , и . J. Netw. Comput. Appl., 30 (1): 167-185 (2007)Dynamic scheduling scheme for handling traffic multiplicity in wavelength division multiplexed optical networks., , , и . ICCCN, стр. 344-349. IEEE, (1999)Enhancing network connectivity using smart mobile sensors., , и . ATNAC, стр. 1-6. IEEE, (2011)Cybersecurity Policy Framework in Saudi Arabia: Literature Review., и . Frontiers Comput. Sci., (2021)IPAS: Implicit Password Authentication System., , и . AINA Workshops, стр. 430-435. IEEE Computer Society, (2011)IPAS: User Test Phase and Evaluation., , и . FCC, том 301 из Lecture Notes in Electrical Engineering, стр. 11-20. Springer, (2014)Core based tree multicast (M-CBT) approach in supporting mobility., , и . Parallel and Distributed Computing and Networks, стр. 147-152. IASTED/ACTA Press, (2004)Real-Time Public Group Collaboration using IP Multicast Label Filters., , , и . NBiS, стр. 525-531. IEEE Computer Society, (2009)SmartVANET: The Case for a Cross-Layer Vehicular Network Architecture., , , , и . AINA Workshops, стр. 362-368. IEEE Computer Society, (2011)An adaptive node density estimation in vanets using received signal power., , и . APCC, стр. 544-549. IEEE, (2015)