Author of the publication

A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks.

, , , and . WISEC, page 245-252. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing Bandwidth Broker Using COPS-PR in Java., and . LCN, page 178-179. IEEE Computer Society, (2001)A Blockchain Based Liability Attribution Framework for Autonomous Vehicles., , , and . CoRR, (2018)Securing data provenance in body area networks using lightweight wireless link fingerprints., , , and . TrustED@CCS, page 65-72. ACM, (2013)Building agents for rule-based intrusion detection system., and . Comput. Commun., 25 (15): 1366-1373 (2002)Improving the coverage range of ultrasound-based localization systems., , and . WCNC, page 605-610. IEEE, (2011)Resource-aware video multicasting via access gateways in wireless mesh networks., , , , and . ICNP, page 43-52. IEEE Computer Society, (2008)Leveraging lightweight blockchain to establish data integrity for surveillance cameras., , , , and . IEEE ICBC, page 1-3. IEEE, (2020)Protecting Multicast Sessions in Wireless Mesh Networks., , , and . LCN, page 467-474. IEEE Computer Society, (2006)Probabilistically reliable on-demand multicast in wireless mesh networks., , , , and . WOWMOM, page 1-9. IEEE Computer Society, (2008)Non-Cooperative Coexistence of Co-located Independent Wireless Mesh Networks., , and . MASS, page 1-9. IEEE Computer Society, (2007)