Author of the publication

A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment.

, and . ISA, volume 5576 of Lecture Notes in Computer Science, page 682-691. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kausar, Firdous
add a person with the name Kausar, Firdous
 

Other publications of authors with the same name

Analysis of Free Download Manager for Forensic Artefacts., , and . ICDF2C, volume 31 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 59-68. Springer, (2009)A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment., and . ISA, volume 5576 of Lecture Notes in Computer Science, page 682-691. Springer, (2009)A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks., , , and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 745-757. Springer, (2007)An Efficient Multi Recipient Signcryption Scheme Offering Non Repudiation., , and . CIT, page 1577-1581. IEEE Computer Society, (2010)A cluster-based key agreement scheme using keyed hashing for Body Area Networks., , , and . Multimedia Tools Appl., 66 (2): 201-214 (2013)A secure ECC-based RFID mutual authentication protocol for internet of things., , , and . The Journal of Supercomputing, 74 (9): 4281-4294 (2018)An Analysis of Public Key Cryptography based Techniques in Wireless Sensor Networks., and . IMECS, page 341-345. Newswood Limited, (2007)Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks., , , and . MSN, volume 4864 of Lecture Notes in Computer Science, page 737-748. Springer, (2007)Analysis of Internet Download Manager for collection of digital forensic artefacts., , and . Digital Investigation, 7 (1-2): 90-94 (2010)Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication., , and . ISA, volume 76 of Communications in Computer and Information Science, page 198-208. Springer, (2010)