Author of the publication

A reliable topology for efficient key distribution in ad-hoc networks.

, , , , and . WOWMOM, page 1-5. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Gateway Selection Protocol for DYMO-Based MANET., , , , and . WiMob, page 32-37. IEEE Computer Society, (2008)A reliable topology for efficient key distribution in ad-hoc networks., , , , and . WOWMOM, page 1-5. IEEE Computer Society, (2008)Traitor Tracing Technology of Streaming Contents Delivery using Traffic Pattern in Wired/Wireless Environments., , , , and . GLOBECOM, IEEE, (2006)SA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networks., , and . ICC, page 1464-1468. IEEE, (2008)A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks., , , , and . IEEE Trans. Vehicular Technology, 58 (5): 2471-2481 (2009)Gateway Selection Protocol in Hybrid MANET Using DYMO Routing., , , , and . Mob. Networks Appl., 15 (2): 205-215 (2010)NHAG: Network-Aware Hierarchical Arrangement Graph for Application Layer Multicast in Heterogeneous Networks., , , and . GLOBECOM, page 1993-1997. IEEE, (2007)A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks., , , , and . GLOBECOM, IEEE, (2006)Analysis of the node isolation attack against OLSR-based mobile ad hoc networks., , , , and . ISCN, page 30-35. IEEE, (2006)A Classifier of Similar Characters using Compound Mahalanobis Function based on Difference Subspace., , and . ICDAR, page 432-436. IEEE Computer Society, (2007)