Author of the publication

A Zone-Based Distributed Key Management Scheme for Wireless Mesh Networks.

, , , , and . COMPSAC, page 68-71. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application Research on Virtualized Desktop Technology in Private Colleges and Universities of Art and Design., , , , , , and . ICSAI, page 538-543. IEEE, (2018)A Study on Secure RFID Mutual Authentication Scheme., and . GreenCom/CPSCom, page 706-710. IEEE Computer Society, (2010)A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks., , and . COMPSAC (2), page 75-80. IEEE Computer Society, (2007)978-0-7695-2870-0.A Composite Key Management Scheme for Mobile Ad Hoc Networks., , and . OTM Workshops (1), volume 4277 of Lecture Notes in Computer Science, page 575-584. Springer, (2006)Sketch Based Anomaly Detection Scheme in Wireless Sensor Networks., and . CyberC, page 344-348. IEEE Computer Society, (2013)Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN., , and . TrustCom, page 961-966. IEEE Computer Society, (2014)A Data Reconstruction Algorithm Based on Neural Network for Compressed Sensing., , and . CBD, page 291-295. IEEE Computer Society, (2017)Joint computation offloading and resource allocation for end-edge collaboration in internet of vehicles via multi-agent reinforcement learning., , , , , and . Neural Networks, (2024)Software and Behavior Diversification for Swarm Robotics Systems., , , , , and . MTD@CCS, page 33-36. ACM, (2023)MISTER: An Approximate Minimum Steiner Tree Based Routing Scheme in Wireless Sensor Networks., , , and . ICSI (2), volume 9713 of Lecture Notes in Computer Science, page 317-323. Springer, (2016)