Author of the publication

Zero pre-shared secret key establishment in the presence of jammers.

, , and . MobiHoc, page 219-228. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rebound: Decoy routing on asymmetric routes via error messages., , , , , , and . LCN, page 91-99. IEEE Computer Society, (2015)NDN in Large Detached Underwater Sensing Arrays., , , , and . GLOBECOM Workshops, page 1-6. IEEE, (2016)Zero pre-shared secret key establishment in the presence of jammers., , and . MobiHoc, page 219-228. ACM, (2009)On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming., , , and . WISEC, page 97-108. ACM, (2011)On the Performance of IEEE 802.11 under Jamming., , , , , and . INFOCOM, page 1265-1273. IEEE, (2008)Rapid Interoperability with OverlAI Gateways., , , , , , and . MILCOM, page 253-258. IEEE, (2022)Efficient broadcast communication in the presence of inside attackers: A non-cooperative game., and . WOWMOM, page 1-7. IEEE Computer Society, (2012)GymFG: A Framework with a Gym Interface for FlightGear., , , , and . CoRR, (2020)Efficient Private Publish-Subscribe Systems., , , , and . ISORC, page 64-71. IEEE Computer Society, (2014)Mission-Centric Content Sharing Across Heterogeneous Networks., , , , , , , , , and 9 other author(s). ICNC, page 1034-1038. IEEE, (2019)