Author of the publication

Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation.

, , and . IEEE Trans. Mob. Comput., 5 (10): 1417-1431 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving software reliability and productivity via mining program source code., , , and . IPDPS, page 1-5. IEEE, (2008)Mining API patterns as partial orders from source code: from usage scenarios to specifications., , , and . ESEC/SIGSOFT FSE, page 25-34. ACM, (2007)Oracle-based Regression Test Selection., , , and . ICST, page 292-301. IEEE Computer Society, (2013)Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation., , and . IEEE Trans. Mob. Comput., 5 (10): 1417-1431 (2006)Impact Analysis of Configuration Changes for Test Case Selection., , and . ISSRE, page 140-149. IEEE Computer Society, (2011)Secure Comparison of Encrypted Data in Wireless Sensor Networks., , and . WiOpt, page 47-53. IEEE Computer Society, (2005)'Laurel and Hardy' model for analyzing process synchronization algorithms and primitives., and . SIGCSE Bulletin, 35 (2): 107-110 (2003)Practical change impact analysis based on static program slicing for industrial software systems., and . ICSE, page 746-755. ACM, (2011)Automatic generation and inference of interface properties from program source code.. OOPSLA Companion, page 750-751. ACM, (2006)Practical change impact analysis based on static program slicing for industrial software systems., and . SIGSOFT FSE, page 13. ACM, (2012)