Author of the publication

An energy efficient and load balanced distributed routing scheme for wireless sensor networks with holes.

, , , and . J. Syst. Softw., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions., , , and . IACR Cryptol. ePrint Arch., (2023)Higher-order queries and applications.. University of Oxford, UK, (2012)British Library, EThOS.zk-SNARKs from Codes with Rank Metrics., , and . IMACC, volume 14421 of Lecture Notes in Computer Science, page 99-119. Springer, (2023)Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions., , and . ARES, page 28:1-28:6. ACM, (2019)On Security Notions for Encryption in a Quantum World., , and . INDOCRYPT, volume 13774 of Lecture Notes in Computer Science, page 592-613. Springer, (2022)A method for mapping and monitoring of iron ore stopes based on hyperspectral remote sensing-ground data and a 3D deep neural network., , , and . Neural Comput. Appl., 35 (16): 12221-12232 (June 2023)On the Security Notions for Encryption in a Quantum World., , and . IACR Cryptol. ePrint Arch., (2020)On the Everlasting Security of Password-Authenticated Quantum Key Exchange., , and . CoRR, (2019)Public-Key Encryption with Quantum Keys., , , , , , and . TCC (4), volume 14372 of Lecture Notes in Computer Science, page 198-227. Springer, (2023)Semi-quantum Copy-Protection and More., , and . TCC (4), volume 14372 of Lecture Notes in Computer Science, page 155-182. Springer, (2023)