Author of the publication

An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in Wireless Sensor Networks.

, , and . CIT, page 227. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks., and . Secur. Commun. Networks, 4 (2): 109-121 (2011)ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks., and . WWIC, volume 4517 of Lecture Notes in Computer Science, page 235-246. Springer, (2007)A framework for confronting key-swapping collusion attack on random pairwise key pre-distribution schemes for distributed sensor networks., and . MASS, page 815-820. IEEE Computer Society, (2008)An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks., and . International Conference on Computational Science (4), volume 4490 of Lecture Notes in Computer Science, page 590-593. Springer, (2007)A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks., , and . APNOMS, volume 4238 of Lecture Notes in Computer Science, page 546-549. Springer, (2006)Early and Lightweight Distributed Detection of Node Replication Attack in Sensor Networks., and . WCNC, page 1-6. IEEE, (2010)Adaptive Algorithms to Enhance Routing and Security for Wireless PAN Mesh Networks., , , and . OTM Workshops (1), volume 4277 of Lecture Notes in Computer Science, page 585-594. Springer, (2006)Non-threshold Deterministic Parwise Key Establishment Scheme for Clustered Distributed Sensor Networks., and . BroadCom, page 44-49. IEEE Computer Society, (2008)An Efficient ID-Based Bilinear Key Predistribution Scheme for Distributed Sensor Networks., , and . HPCC, volume 4208 of Lecture Notes in Computer Science, page 260-269. Springer, (2006)Controlled link establishment attacks on distributed sensor networks and countermeasures. University of Technology Sydney, Australia, (2010)