Author of the publication

A framework for confronting key-swapping collusion attack on random pairwise key pre-distribution schemes for distributed sensor networks.

, and . MASS, page 815-820. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulating a rural wireless network using SCILAB., and . IADIS AC, page 357-364. IADIS, (2005)Self Trajectory Estimation for wireless mobile networks., and . BroadBandCom, page 71-75. Wrocław University of Technology, (2009)Use of Street Maps to Aid Node Localization in Mobile Wireless Networks., and . ISPA, page 471-476. IEEE Computer Society, (2008)Self-Configuration of Network Services with Biologically Inspired Learning and Adaptation., , and . J. Netw. Syst. Manag., 15 (1): 87-116 (2007)QoS Functions and Theorems for Moving Wireless Networks.. ICITA (2), page 208-213. IEEE Computer Society, (2005)Non-threshold Deterministic Parwise Key Establishment Scheme for Clustered Distributed Sensor Networks., and . BroadCom, page 44-49. IEEE Computer Society, (2008)Per node deployment based detection of controlled link establishment attack in distributed sensor networks., , and . Int. J. Sens. Networks, 9 (3/4): 192-208 (2011)Modelling and Information Fusion in Digital Identity Management Systems., and . ICN/ICONS/MCL, page 181. IEEE Computer Society, (2006)Early and Lightweight Distributed Detection of Node Replication Attack in Sensor Networks., and . WCNC, page 1-6. IEEE, (2010)UWB Signal Bandwidth Expansion and Synthesis Using Prolate and Wavelet Functions., and . ICMB, page 686-689. IEEE Computer Society, (2005)