Author of the publication

Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks.

, , and . IJDSN, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantifying the Interference Gray Zone in Wireless Networks: A Measurement Study., , , , and . ICC, page 3758-3763. IEEE, (2007)Half Direct-Link Setup (H-DLS) for Fairness between External and Local TCP Connections in IEEE 802.11e Wireless LANs., , , and . ICC, page 4500-4505. IEEE, (2007)A Scalable Rate Adaptation Mechanism for IEEE 802.11e Wireless., , , and . FGCN (1), page 505-509. IEEE Computer Society, (2007)Security and efficiency in authentication protocols resistant to password guessing attack., and . LCN, page 245-252. IEEE Computer Society, (1997)Virtual Vertex Routing (VVR) for Course-Based Vehicular Ad Hoc Networks., , , and . WCNC, page 4405-4410. IEEE, (2007)An Energy-efficient and Lightweight Indoor Localization System for Internet-of-Things (IoT) Environments., , , , and . IMWUT, 2 (1): 17:1-17:28 (2018)Partial Key Exposure Attacks on Unbalanced RSA with the CRT., , and . IEICE Transactions, 89-A (2): 626-629 (2006)An Adaptive Network Mobility Support Protocol in Hierarchical Mobile IPv6 Networks., , , and . IEEE Trans. Vehicular Technology, 58 (7): 3627-3639 (2009)SNC: a selective neighbor caching scheme for fast handoff in IEEE 802.11 wireless networks., , , and . Mobile Computing and Communications Review, 9 (4): 39-49 (2005)LinkA: A Link Layer Anonymization Method Based on Bloom Filter for Authenticated IoT Devices., , and . Intelligent Automation & Soft Computing, 22 (3): 365-369 (2016)