Author of the publication

Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication.

, , , and . KSII Trans. Internet Inf. Syst., 7 (4): 878-894 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation., , and . ADCONS, volume 7135 of Lecture Notes in Computer Science, page 478-485. Springer, (2011)MutatedSocioAgentSim (MSAS): semisupervised modelling of multiagent simulation to predict and detect the mutation in a camouflaged social network., and . Turkish J. Electr. Eng. Comput. Sci., 26 (2): 961-973 (2018)IBeH: Naïve Community Detection Methodology for Dark Social Network., and . ICIA, page 111:1-111:4. ACM, (2016)SpyNetMiner: An Outlier Analysis to Tag Elites in Clandestine Social Networks., , and . IJDWM, 10 (1): 32-54 (2014)Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET., and . Clust. Comput., 18 (4): 1549-1559 (2015)Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication., , , and . KSII Trans. Internet Inf. Syst., 7 (4): 878-894 (2013)Key Distribution Protocol for Secure Multicast with Reduced Communication Delay., , , and . AMT, volume 6890 of Lecture Notes in Computer Science, page 312-323. Springer, (2011)A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks., and . Int. J. Inf. Secur. Priv., 8 (2): 1-18 (2014)An Intelligent Intrusion Detection System Using Hybrid Deep Learning Approaches in Cloud Environment., , , , and . ICCCSP, volume 651 of IFIP Advances in Information and Communication Technology, page 281-298. Springer, (2022)A Detailed Survey on Recent Trends in Secure XML Labeling Schemes., and . ICIA, page 84:1-84:6. ACM, (2016)