Author of the publication

Efficient key generation leveraging channel reciprocity and balanced gray code.

, , , , and . Wireless Networks, 25 (2): 611-624 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Method to Protect Software from Cracking., , and . CSIE (2), page 636-638. IEEE Computer Society, (2009)Analyzing the performance of Aloha in string multi-hop underwater acoustic sensor networks., , , and . EURASIP J. Wireless Comm. and Networking, (2013)Study on the Data Flow Balance in NFS Server with iSCSI., , , and . ICA3PP (1), volume 7439 of Lecture Notes in Computer Science, page 253-272. Springer, (2012)Improving the Data Placement Algorithm of Randomization in SAN., , and . International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 415-422. Springer, (2005)Outage Probability Equivalency of Three Typical Relay Selection Schemes for Selective DF Relay Networks with Selection Combining., , , , and . Wireless Personal Communications, 85 (3): 1205-1215 (2015)A collusion-resistant dynamic key management scheme for WSNs., and . Security and Communication Networks, 9 (18): 6351-6364 (2016)IoT enabled adaptive clustering based energy efficient routing protocol for wireless sensor networks., , , , , and . IJAHUC, 32 (2): 133-145 (2019)NSM: A Security Mechanism for Object-Based Storage System., and . CSIE (4), page 48-52. IEEE Computer Society, (2009)An anonymous data reporting strategy with ensuring incentives for mobile crowd-sensing., , , , , and . J. Ambient Intelligence and Humanized Computing, 9 (6): 2093-2107 (2018)On the using of discrete wavelet transform for physical layer key generation., and . Ad Hoc Networks, (2017)