Author of the publication

Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks.

, , , and . ICETE (Selected Papers), volume 48 of Communications in Computer and Information Science, page 166-179. (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leads from Physical, Chemical, and Thermal Characterization on Cytotoxic Effects of Xylan-Based Microparticles, , , , , , , , , and 2 other author(s). POLYMERS, 7 (11): 2304-2315 (2015)The Convergence Control to the ACO Metaheuristic Using Annotated Paraconsistent Logic., , , , and . ISICA, volume 5821 of Lecture Notes in Computer Science, page 382-391. Springer, (2009)SEMAN: A Novel Secure Middleware for Mobile Ad Hoc Networks., and . J. Comput. Networks Commun., (2016)A Network Service for Preventing Data Leakage from IoT Cloud-assisted Equipment., , , , , , , , , and . ISCC, page 1-7. IEEE, (2019)Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations., , , , , , and . Networking, page 334-342. IEEE, (2020)Security challenges to smart agriculture: Current state, key issues, and future directions., , and . Array, (2020)SEMAN - uma proposta de Middleware seguro para as redes ad hoc móveis.. Federal University of Paraná, Curitiba, Brazil, (2014)ndltd.org (oai:agregador.ibict.br.RI_UFPR:oai:dspace.c3sl.ufpr.br:1884/35895).Safeguarding from abuse by IoT vendors: Edge messages verification of cloud-assisted equipment., , , , , , , , , and . IM, page 599-603. IFIP, (2019)Towards a fully self-organized identity-based key management system for MANETs., and . WiMob, page 717-723. IEEE Computer Society, (2013)Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks., , , and . ICETE (Selected Papers), volume 48 of Communications in Computer and Information Science, page 166-179. (2008)