Author of the publication

Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks.

, , , , , , and . Comput. Commun., 32 (13-14): 1445-1459 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks., , , , and . EWSN, volume 4913 of Lecture Notes in Computer Science, page 305-320. Springer, (2008)FLAT: Federated lightweight authentication for the Internet of Things., , , , , and . Ad Hoc Networks, (2020)ID-MAC: An identity-based MAC protocol for Wireless Sensor Networks., , , , and . ISCC, page 975-981. IEEE Computer Society, (2013)SOS: Secure Overlay Sensornets., , and . PerCom Workshops, page 548-553. IEEE Computer Society, (2007)NomadiKey: User authentication for smart devices based on nomadic keys., , , , , , , , and . ICC, page 1-6. IEEE, (2016)MAC protocols for wireless sensor networks over radio-over-fiber links., , , and . ICC, page 254-259. IEEE, (2012)Federated authentication of things: demo abstract., , , , , and . IPSN, page 136-137. IEEE / ACM, (2018)The Computer for the 21st Century: Security & Privacy Challenges after 25 Years., , , , , and . ICCCN, page 1-10. IEEE, (2017)Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller., , and . J. Cryptogr. Eng., 2 (1): 19-29 (2012)SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks., , , , and . NCA, page 145-154. IEEE Computer Society, (2006)