Author of the publication

A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks.

, , and . CIS, page 625-629. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Message-Oriented Message Dissemination and Authentication Scheme for Vehicular Ad Hoc Networks., , and . ISPA/BDCloud/SocialCom/SustainCom, page 223-228. IEEE, (2019)ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings., , and . ISECS, page 179-183. IEEE Computer Society, (2008)A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks., , and . CIS, page 625-629. IEEE Computer Society, (2011)IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program., , , , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 336-345. Springer, (2009)Fluent: Round-efficient Secure Aggregation for Private Federated Learning., , , , , and . CoRR, (2024)An Anonymous Conditional Privacy-Preserving Authentication Scheme for VANETs., , and . HPCC/SmartCity/DSS, page 1763-1770. IEEE, (2019)Secure Updatable Storage Access Control System for EHRs in the Cloud., , , , , and . IEEE Trans. Serv. Comput., 16 (4): 2939-2953 (July 2023)DROP: Detecting Return-Oriented Programming Malicious Code., , , , , and . ICISS, volume 5905 of Lecture Notes in Computer Science, page 163-177. Springer, (2009)A Practical Electronic Voting Protocol Based upon Oblivious Signature Scheme., , and . CIS (1), page 381-384. IEEE Computer Society, (2008)Attribute-Based Encryption with Efficient Keyword Search and User Revocation., , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 490-509. Springer, (2018)