Author of the publication

Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks.

, and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 573-583. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flow Control Strategy for Flexible Machining and Assembly System., , and . PROLAMAT, volume B-3 of IFIP Transactions, page 577-584. North-Holland, (1992)Common Requirements for Web Application Vulnerability Scanners for the Internet of Things., and . ICSSA, page 111. IEEE, (2017)Decoder-Free Sino-Korean Shellcode., , , and . ICSSA, page 75-78. IEEE, (2016)Detecting truncation point in steady-state simulation using chaos theory., and . WSC, page 353-360. ACM, (1994)Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks., and . UIC, volume 4611 of Lecture Notes in Computer Science, page 535-544. Springer, (2007)Implementation of Cloud Computing Environment for Discrete Event System Simulation using Service Oriented Architecture., , , , and . EUC, page 359-362. IEEE Computer Society, (2010)Defending against wireless network intrusion., , , and . J. Comput. Syst. Sci., 80 (3): 499-501 (2014)An approach for finding discrete variable design alternatives using a simulation optimization method., , and . WSC, page 678-685. WSC, (1999)Enriching Security Education Hands-on Labs with Practical Exercises., , , , and . ICSSA, page 100-103. IEEE, (2017)New Heuristics for No-Wait Flowshop Scheduling with Precedence Constraints and Sequence Dependent Setup Time., and . ICCSA (4), volume 3483 of Lecture Notes in Computer Science, page 467-476. Springer, (2005)