From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhancing frequency-based wormhole attack detection with novel jitter waveforms., , , и . SecureComm, стр. 304-309. IEEE, (2007)Detection of side-channel communication in ad hoc networks using request to send (RTS) messages., , , , , , и . CCECE, стр. 1-6. IEEE, (2014)Using covert timing channels for attack detection in MANETs., , и . MILCOM, стр. 1-7. IEEE, (2012)Fault-Tolerant Exploration of an Unknown Dangerous Graph by Scattered Agents., , , и . SSS, том 7596 из Lecture Notes in Computer Science, стр. 299-313. Springer, (2012)Continuous Physical Layer Authentication Using a Novel Adaptive OFDM System., , , , и . ICC, стр. 1-5. IEEE, (2011)Analysis of Chinese Remainder Theorem Based Group Key Management Protocols., , и . Security and Management, стр. 86-92. CSREA Press, (2009)Cross-Layer Security Management Framework for Mobile Tactical Networks., , , и . MILCOM, стр. 220-225. IEEE, (2013)Simulation implementation and performance analysis for situational awareness data dissemination in a tactical manet., , , и . WSC, стр. 2343-2354. IEEE/ACM, (2014)Combined Authentication and Quality of Service in Cooperative Communication Networks., , , и . EUC, стр. 566-571. IEEE Computer Society, (2010)Trust establishment with data fusion for secure routing in MANETs., , , , и . ICC, стр. 671-676. IEEE, (2014)