Author of the publication

An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs.

, , , , , and . INFOCOM, page 605-613. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel design for content delivery over software defined mobile social networks., , , and . IEEE Network, 29 (4): 62-67 (2015)A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks., , , , and . IJSN, 3 (2): 122-132 (2008)An efficient dynamic-identity based signature scheme for secure network coding., , , , and . Computer Networks, 54 (1): 28-40 (2010)Provably secure robust threshold partial blind signature., , and . Science in China Series F: Information Sciences, 49 (5): 604-615 (2006)A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks., , , , and . IEEE Trans. Parallel Distrib. Syst., 25 (1): 22-32 (2014)Security and privacy of collaborative spectrum sensing in cognitive radio networks., , , , and . IEEE Wireless Commun., 19 (6): 106-112 (2012)Cooperative Peer-to-Peer Information Exchange via Wireless Network Coding., , , and . GLOBECOM, page 1-7. IEEE, (2009)Secure Localized Authentication and Billing for Wireless Mesh Networks., , , , and . GLOBECOM, page 486-491. IEEE, (2007)Sybil-aware least cost rumor blocking in social networks., , and . GLOBECOM, page 692-697. IEEE, (2014)An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs., , , , , and . INFOCOM, page 605-613. IEEE, (2010)