Author of the publication

Quality of security through triple key scheme in wireless sensor networks.

, and . Wireless Communications and Mobile Computing, 10 (5): 722-732 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Detecting Extremely Low Frequency Fields Using a Wireless Sensor Network., and . SNPD, page 150-156. IEEE Computer Society, (2011)A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments., , , , , and . IEEE Access, (2017)Perceptions and Experiences of General Practice Users About MyHealthRecord., , , and . HIS, volume 11148 of Lecture Notes in Computer Science, page 3-16. Springer, (2018)DSS: Dynamic Switching Sets for prolonging network lifetime in sensor nodes., and . LCN Workshops, page 726-731. IEEE Computer Society, (2012)Running multi-sequence applications in wireless sensor networks., and . MoMM, page 365-369. ACM, (2009)Realistic and Efficient Radio Propagation Model to Handle Obstacles for Vehicle-to-X Communications., , , , and . TIIS, 7 (8): 1933-1954 (2013)An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks., , , and . IEEE Communications Letters, 15 (11): 1205-1207 (2011)Addressing the Confidentiality and Integrity of Assistive Care Loop Framework Using Wireless Sensor Networks., , and . ICSEng, page 416-421. IEEE, (2011)EP2AC: An Efficient Privacy-Preserving Data Access Control Scheme for Data-Oriented Wireless Sensor Networks., and . HPCC/CSS/ICESS, page 755-762. IEEE, (2014)A multi-hop cross layer decision based routing for VANETs., , and . Wireless Networks, 21 (5): 1647-1660 (2015)