Author of the publication

LHA-SP: secure protocols for hierarchical wireless sensor networks.

, , and . Integrated Network Management, page 31-44. IEEE, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-Scale Statistical Control Process for Mobility and Interference Identification in IEEE 802.11., , and . Mob. Networks Appl., 14 (6): 725-743 (2009)Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks., , , , , , and . Comput. Commun., 32 (13-14): 1445-1459 (2009)Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems., , , and . Comput. Commun., 31 (12): 2838-2849 (2008)A reactive role assignment for data routing in event-based wireless sensor networks., , , , , and . Comput. Networks, 53 (12): 1980-1996 (2009)BeanWatcher: A Tool to Generate Multimedia Monitoring Applications for Wireless Sensor Networks., , , and . MMNS, volume 2839 of Lecture Notes in Computer Science, page 128-141. Springer, (2003)Centrality-based routing for Wireless Sensor Networks., , and . Wireless Days, page 1-5. IEEE, (2010)SecLEACH - On the security of clustered sensor networks., , , , , , and . Signal Process., 87 (12): 2882-2895 (2007)Defining a Wireless Sensor Network Management Protocol., , , , and . LANOMS, page 39-50. UFRGS, (2005)A Voronoi Approach for Scalable and Robust DV-Hop Localization System for Sensor Networks., , , and . ICCCN, page 497-502. IEEE, (2007)Management of wireless sensor networks., , and . Integrated Network Management, page 788. IEEE, (2005)