Author of the publication

Two-factor mutual authentication with key agreement in wireless sensor networks.

, , and . Secur. Commun. Networks, 9 (2): 171-183 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A distributed framework for energy-efficient lightpaths in computational grids., , , , and . J. High Speed Networks, 19 (1): 1-18 (2013)Computer-aided modeling, analysis, and design of communication networks., and . IEEE J. Sel. Areas Commun., 6 (1): 130-145 (1988)Secure communication mechanism for ubiquitous Smart grid infrastructure., , and . J. Supercomput., 64 (2): 435-455 (2013)Frame-level performance measurement in an ATM test-bed environment: methodologies and experiences., , and . Int. J. Netw. Manag., 14 (4): 279-286 (2004)A new reconfiguration protocol for mesh optical networks., , , and . IEEE Commun. Lett., 9 (6): 558-560 (2005)A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures., , and . ACM Trans. Internet Techn., 21 (4): 81:1-81:22 (2021)A MAC protocol for cognitive wireless body area sensor networking., , and . IWCMC, page 168-172. ACM, (2010)A Generalized Framework for Quality of Experience (QoE)-Based Provisioning in a Vehicular Cloud., , and . ICUWB, page 1-5. IEEE, (2015)Hierarchical Location Service for Large Scale Wireless Sensor Networks with Mobile Sinks., , , and . GLOBECOM, page 1222-1226. IEEE, (2007)Practical Coding-Aware Mechanism for Opportunistic Routing in Wireless Mesh Networks., , , and . ICC, page 2871-2876. IEEE, (2008)