Author of the publication

Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network.

, , , and . NOMS, page 603-606. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TMN Distributed Management with CORBA: A Experience in Alarm Surveillance., , and . PDPTA, page 2692-2698. CSREA Press, (1999)Defending Grids Against Intrusions., , , and . IWSOS/EuroNGI, volume 4124 of Lecture Notes in Computer Science, page 248-250. Springer, (2006)A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic., , and . Sensors, 23 (15): 6933 (August 2023)An Experimentation on CoAP Multi Factor Authentication Mechanism with Reputation for Internet of Things Constrained Devices and Low Power Wide Area Network., , , and . ICOIN, page 67-72. IEEE, (2023)Hybrid protocol for group key management and transparent cluster interconnection in a secure wireless sensor network., , , and . NOMS, page 603-606. IEEE, (2012)Security management against cloned cellular telephones., , , and . ICON, page 356-363. IEEE, (1999)Security Approaches for Cluster Interconnection in a Wireless Sensor Network., and . APNOMS, volume 4238 of Lecture Notes in Computer Science, page 542-545. Springer, (2006)Using Fuzzy Specifications to Manage QoS., and . LANOMS, page 269-280. UFMG, (2001)Distribution of Network Management Policies with Emphasis on Quality of Service., and . LANOMS, page 213-224. UFRGS, (2005)Hybrid approach to intrusion detection in fog-based IoT environments., , , , and . Comput. Networks, (2020)