Author of the publication

A key pre-distribution scheme for secure sensor networks using probability density function of node deployment.

, , , and . SASN, page 69-75. ACM, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A visibility improvement technique for fog images suitable for real-time application., , , , , , and . Real-Time Image and Video Processing, volume 8656 of SPIE Proceedings, page 86560Q. SPIE, (2013)Evaluation of Incongruent Feeling During Mouse Operation Using Eye Gaze and EEG., , and . HCI (38), volume 1224 of Communications in Computer and Information Science, page 557-564. Springer, (2020)A 24MB Embedded Flash System Based on 28nm SG-MONOS Featuring 240MHz Read Operations and Robust Over-The-Air Software Update for Automotive., , , , , , , , , and . VLSI Circuits, page 210-. IEEE, (2019)Search Method of Number of Trees for Genetic Programming with Multiple Trees.. IMCOM, page 1-6. IEEE, (2021)A 40nm Embedded SG-MONOS Flash Macro for High-end MCU Achieving 200MHz Random Read Operation and 7.91Mb/mm2 Density with Charge Assisted Offset Cancellation Sense Amplifier., , , , , , , , , and 5 other author(s). A-SSCC, page 1-3. IEEE, (2021)Homomorphic encryption based cancelable biometrics secure against replay and its related attack., , , , and . ISITA, page 421-425. IEEE, (2012)Every Normal Toeplitz Matrix is Either of Type I or of Type II.. SIAM J. Matrix Anal. Appl., 17 (4): 998-1006 (1996)A 28 nm Embedded Split-Gate MONOS (SG-MONOS) Flash Macro for Automotive Achieving 6.4 GB/s Read Throughput by 200 MHz No-Wait Read Operation and 2.0 MB/s Write Throughput at Tj of 170°C., , , , , , , and . IEEE J. Solid State Circuits, 51 (1): 213-221 (2016)Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting., , , , , , and . IMACC, volume 7089 of Lecture Notes in Computer Science, page 190-209. Springer, (2011)Population and Evolutionary Dynamics based on Predator-Prey Relationships in a 3D Physical Simulation., , , and . Artif. Life, 22 (2): 226-240 (2016)