Author of the publication

A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks.

, , and . ICDCIT, volume 4317 of Lecture Notes in Computer Science, page 102-115. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Management in Wireless Sensor Networks with a Public Key Based Scheme., , , and . APNOMS, volume 4773 of Lecture Notes in Computer Science, page 503-506. Springer, (2007)Protection of Integrity and Ownership of PDF Documents Using Invisible Signature., , , and . UKSim, page 533-537. IEEE Computer Society, (2012)On the Key Revocation Schemes in Wireless Sensor Networks., , and . GreenCom/iThings/CPScom, page 290-297. IEEE, (2013)PeerMate: A malicious peer detection algorithm for P2P systems based on MSPCA., , , and . ICNC, page 815-819. IEEE Computer Society, (2012)Smartening the Environment using Wireless Sensor Networks in a Developing Country, , and . CoRR, (2007)NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks., , , , and . Int. Arab J. Inf. Technol., 5 (1): 102-107 (2008)Information integrity in smart grid systems., , , , and . Inf. Syst., (2015)Cyber Security Concerns in Social Networking Service., , , and . Int. J. Commun. Networks Inf. Secur., (2020)Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification., and . Complex Adapt. Syst. Model., (2019)A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards., and . IEICE Trans. Inf. Syst., 90-D (11): 1885-1888 (2007)