Author of the publication

DRKH: A Power Efficient Encryption Protocol forWireless Devices.

, , , and . LCN, page 822-829. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy-Based Clustering and Data Aggregation for Multimodal WSN (C-Damm)., , and . I. J. Robotics and Automation, (2014)A novel fuzzy HEED security using VEGK for wireless sensor networks., , and . MASS Workshops, page 1-6. IEEE Computer Society, (2012)978-1-4673-2433-5.Human-inspired features for natural scene classification., , and . Pattern Recognition Letters, 34 (13): 1525-1530 (2013)RDI System for Intrinsic Plagiarism Detection (RDI_RID), Working Notes for PANAraPlagDet at FIRE 2015., , , , and . FIRE Workshops, volume 1587 of CEUR Workshop Proceedings, page 129-130. CEUR-WS.org, (2015)DRKH: dynamic re-keying with key hopping., , , and . PE-WASUN, page 260-261. ACM, (2005)DRKH: A Power Efficient Encryption Protocol forWireless Devices., , , and . LCN, page 822-829. IEEE Computer Society, (2005)Evolutionary Content Pre-fetching in Mobile Networks., and . ICMLA (1), page 386-391. IEEE, (2013)On the Ranking of Information Retrieval Boolean Model., , and . CATA, page 81-86. ISCA, (2010)HICMA: A human imitating cognitive modeling agent using statistical methods and evolutionary computation., and . CIHLI, page 22-29. IEEE, (2014)Evolutionary Scheduling for Mobile Content Pre-fetching., and . TPNC, volume 8273 of Lecture Notes in Computer Science, page 228-239. Springer, (2013)