Author of the publication

Cryptography Efficient Permutation Instructions for Fast Software.

, , and . IEEE Micro, 21 (6): 56-69 (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure data aggregation without persistent cryptographic operations in wireless sensor networks., , , and . IPCCC, IEEE, (2006)A novel cooperative communication protocol for QoS provisioning in wireless sensor networks., , , , and . TRIDENTCOM, page 1-6. IEEE Computer Society, (2009)A Secure Time Synchronization Scheme for Heterogeneous Sensor Networks., , , and . GLOBECOM, page 5143-5147. IEEE, (2007)Performance analysis of server-based poll-each-read in wireless Internet., , and . GLOBECOM, page 5. IEEE, (2005)Enhancing Security using Calling Activity for Wireless Networks., , , and . GLOBECOM, IEEE, (2006)An Efficient Key Management Scheme for Heterogeneous Sensor Networks., , , and . GLOBECOM, IEEE, (2006)User Behavior Modeling and Traffic Analysis of IMS Presence Servers., , , and . GLOBECOM, page 2469-2473. IEEE, (2008)Digital pheromone based patrolling algorithm in wireless sensor and actuator networks., and . CCNC, page 496-501. IEEE, (2013)Low-cost wireless sensor networks for remote cardiac patients monitoring applications., , and . Wireless Communications and Mobile Computing, 8 (4): 513-529 (2008)Radio frequency identification: technologies, applications, and research issues., , , , , and . Wireless Communications and Mobile Computing, 7 (4): 457-472 (2007)