Author of the publication

Path key establishment using multiple secured paths in wireless sensor networks.

, , and . CoNEXT, page 43-49. ACM, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shadow Computing: An energy-aware fault tolerant computing model., , and . ICNC, page 73-77. IEEE, (2014)Rejuvenating Shadows: Fault Tolerance with Forward Recovery., , and . HPCC/SmartCity/DSS, page 547-554. IEEE Computer Society, (2017)Privacy-preserving location and mobility management to support tether-free patients in ad-hoc networks., and . ICC, page 42-46. IEEE, (2012)On the Design of Load Factor based Congestion Control Protocols for Next-Generation Networks., and . INFOCOM, page 96-100. IEEE, (2008)Price-based, budget-constrained user-level traffic management in multiple service networks., , and . GLOBECOM, page 2445-2449. IEEE, (2001)A Robust on-Demand Path-Key Establishment Framework via Random Key Predistribution for Wireless Sensor Networks., , , and . EURASIP J. Wirel. Commun. Netw., (2006)Construction of d(H)-disjunct matrix for group testing in hypergraphs., , , , and . J. Comb. Optim., 12 (3): 297-301 (2006)RECA: A Ring-Structured Energy-Efficient Cluster Architecture for Wireless Sensor Networks., and . MSN, volume 3794 of Lecture Notes in Computer Science, page 927-936. Springer, (2005)Similarity Based Optimization for Multiple Query Processing in Wireless Sensor Networks., and . DCOSS, volume 5516 of Lecture Notes in Computer Science, page 117-130. Springer, (2009)An Optimized Clustering and Selective Probing Framework to Support Internet Quality-of-Service Routing., and . Simulation, 82 (5): 311-330 (2006)