Author of the publication

A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks.

, , and . ICDCIT, volume 4317 of Lecture Notes in Computer Science, page 102-115. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber Security Concerns in Social Networking Service., , , and . Int. J. Commun. Networks Inf. Secur., (2020)Smartening the Environment using Wireless Sensor Networks in a Developing Country, , and . CoRR, (2007)Protection of Integrity and Ownership of PDF Documents Using Invisible Signature., , , and . UKSim, page 533-537. IEEE Computer Society, (2012)Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification., and . Complex Adapt. Syst. Model., (2019)Security Management in Wireless Sensor Networks with a Public Key Based Scheme., , , and . APNOMS, volume 4773 of Lecture Notes in Computer Science, page 503-506. Springer, (2007)On the Key Revocation Schemes in Wireless Sensor Networks., , and . GreenCom/iThings/CPScom, page 290-297. IEEE, (2013)Information integrity in smart grid systems., , , , and . Inf. Syst., (2015)PeerMate: A malicious peer detection algorithm for P2P systems based on MSPCA., , , and . ICNC, page 815-819. IEEE Computer Society, (2012)NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks., , , , and . Int. Arab J. Inf. Technol., 5 (1): 102-107 (2008)Secure Clustering in DSN with Key Predistribution and WCDS, and . CoRR, (2007)