Author of the publication

Location verification using bidirectional one-way hash function in wireless sensor networks.

, , , and . IJSNet, 2 (1/2): 82-90 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Device Composition., , , , , , and . ISADS, page 270-278. IEEE Computer Society, (2007)A Software Architecture for Virtual Device Composition and Its Applications., , , , and . UCS, volume 4836 of Lecture Notes in Computer Science, page 150-157. Springer, (2007)Secure Localization and Location Verification in Sensor Networks., , , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 278-287. Springer, (2005)The performance of a watchdog protocol for wireless network security., , and . IJWMC, 2 (1): 28-36 (2007)Zone Based Data Aggregation Scheduling Scheme for Maximizing Network Lifetime., , , , and . ISPA, volume 4742 of Lecture Notes in Computer Science, page 883-894. Springer, (2007)SPDA: A Security Protocol for Data Aggregation in Large-Scale Wireless Sensor Networks., , and . EUC, volume 4096 of Lecture Notes in Computer Science, page 121-130. Springer, (2006)Elimination of surface state induced edge transistors in high voltage NMOSFETs for flash memory devices., , , , , , and . Microelectronics Reliability, 45 (9-11): 1394-1397 (2005)Trust-propagation based authentication protocol in multihop wireless home networks., , , and . COMSWARE, page 1-5. IEEE, (2006)Development Plan of Pet Dog Safe Transportation System Using IP-RFID., , , , , , and . FGIT-GDC, volume 261 of Communications in Computer and Information Science, page 317-328. Springer, (2011)Adaptive transmission scheme using dynamic aggregation and fragmentation in WLAN MAC., , , , and . WCNC, page 1532-1537. IEEE, (2014)