Author of the publication

Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks.

, , , and . ICETE (Selected Papers), volume 48 of Communications in Computer and Information Science, page 166-179. (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SEMAN: A Novel Secure Middleware for Mobile Ad Hoc Networks., and . J. Comput. Networks Commun., (2016)Applying Load Balance to Reduce the Energy Consumption of the Virtual Routing Protocol., and . WINSYS, page 32-37. INSTICC Press, (2009)Towards a User Identification Framework for Mobile Devices., and . CCNC, page 272-276. IEEE, (2008)Reducing Hadoop 3.x energy consumption through Energy Efficient Ethernet., , and . BigComp, page 9-14. IEEE, (2022)Trace-Driven Extension for Noxim Simulator., , and . SBESC, page 102-108. IEEE Computer Society, (2017)TruMan: Trust Management for Vehicular Networks., and . ISCC, page 801-806. IEEE, (2018)Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on Manets., , , and . SECRYPT, page 128-135. INSTICC Press, (2008)A Hierarchical Adaptive Distributed Membership Algorithm., , and . PDPTA, page 30-35. CSREA Press, (2009)Distributed Self-organized Trust Management for Mobile Ad Hoc Networks., , and . NDT (1), volume 293 of Communications in Computer and Information Science, page 506-518. Springer, (2012)Resisting to False Identities Attacks to the Public-Key Management System for Wireless Ad Hoc Networks., , and . MONAMI, volume 97 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 344-357. Springer, (2011)