Author of the publication

Designing Logical Topology for Wireless Sensor Networks: A Multi-Chain Oriented Approach

. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), 4 (1): 20 (February 2013)
DOI: 10.5121/ijasuc.2013.4101

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Coverage-Based Scheduling Algorithm for WSNs.. Int. J. Wirel. Inf. Networks, 21 (1): 48-57 (2014)Data Cleansing during Data Collection fromWireless Sensor Networks., , and . AusDM, volume 158 of CRPIT, page 195-203. Australian Computer Society, (2014)Establishing secured communications in cluster based wireless sensor networks., , and . ISWPC, page 1-6. IEEE, (2013)(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System., , , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 380-392. Springer, (2013)Designing Logical Topology for Wireless Sensor Networks: A Multi-Chain Oriented Approach. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), 4 (1): 20 (02 Charles Sturt University, Australia)A Robust and Lightweight Key Management Protocol for WSNs in Distributed IoT Applications., and . Int. J. Syst. Softw. Secur. Prot., 9 (4): 1-16 (2018)Defence Against Code Injection Attacks., , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 237-251. Springer, (2014)An Effective t-way Test Data Generation Strategy., and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 633-648. Springer, (2015)An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight Cipher., , and . QSHINE, volume 402 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 214-227. Springer, (2021)P-Box Design in Lightweight Block Ciphers: Leveraging Nonlinear Feedback Shift Registers., , and . WCNC, page 1-8. IEEE, (2024)