Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Nakayama, Hidehisa
add a person with the name Nakayama, Hidehisa
 

Other publications of authors with the same name

A reliable topology for efficient key distribution in ad-hoc networks., , , , and . WOWMOM, page 1-5. IEEE Computer Society, (2008)LTRT: An efficient and reliable topology control algorithm for ad-hoc networks., , , and . IEEE Trans. Wireless Communications, 8 (12): 6050-6058 (2009)On Gateway Selection Protocol for DYMO-Based MANET., , , , and . WiMob, page 32-37. IEEE Computer Society, (2008)Fault-resilient sensing in wireless sensor networks., , , and . Computer Communications, 30 (11-12): 2375-2384 (2007)DP Matching Approach for Streaming Contents Detection Using Traffic Pattern., , and . AccessNets, volume 37 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 232-247. Springer, (2009)Ultra-Mobile Echo Network in Health Care System., , , , , , , and . CBMS, page 164-166. IEEE Computer Society, (2008)Network-based traitor-tracing technique using traffic pattern., , and . IEEE Trans. Information Forensics and Security, 5 (2): 300-313 (2010)Development of a WLAN based monitoring system for group activity measurement in real-time., , , , , , , , , and . Journal of Communications and Networks, 13 (2): 86-94 (2011)Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method., , , , and . I. J. Network Security, 5 (3): 338-346 (2007)A Novel Scheme for WSAN Sink Mobility Based on Clustering and Set Packing Techniques., , , and . IEEE Trans. Automat. Contr., 56 (10): 2381-2389 (2011)