Author of the publication

Wormhole-Based Antijamming Techniques in Sensor Networks

, , and . IEEE Transactions on Mobile Computing, 6 (1): 100--114 (January 2007)
DOI: 10.1109/TMC.2007.18

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks., , , and . SecureComm, volume 19 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 228-247. Springer, (2009)Predicting Low-Cost Gas Sensor Readings From Transients Using Long Short-Term Memory Neural Networks., , , and . IEEE Internet Things J., 7 (9): 8451-8461 (2020)Integrity regions: authentication through presence in wireless networks., and . Workshop on Wireless Security, page 1-10. ACM, (2006)Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks., , , and . INFOCOM, page 1442-1450. IEEE, (2007)Towards reliable IoT: Testing LoRa communication., , , and . SoftCOM, page 1-3. IEEE, (2018)On the Usability of Secure Association of Wireless Devices Based on Distance Bounding., , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 443-462. Springer, (2009)Border Games in Cellular Networks., , , and . INFOCOM, page 812-820. IEEE, (2007)SecNav: secure broadcast localization and time synchronization in wireless networks., , and . MobiCom, page 310-313. ACM, (2007)Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads., , and . NCA, page 278-283. IEEE Computer Society, (2009)LIRA: A new key deployment scheme for Wireless Body Area Networks., , and . SoftCOM, page 1-6. IEEE, (2013)