Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Predistribution Using Transversal Design on a Grid of Wireless Sensor Network., , and . Ad Hoc & Sensor Wireless Networks, 5 (3-4): 247-264 (2008)Key pre-distribution using partially balanced designs in wireless sensor networks., and . IJHPCN, 7 (1): 19-28 (2011)On characterization of catastrophic faults in two-dimensional VLSI arrays., , and . Integration, 38 (2): 267-281 (2004)Key Predistribution Schemes Using Codes in Wireless Sensor Networks., and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 275-288. Springer, (2008)Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach., , and . ICISS, volume 8303 of Lecture Notes in Computer Science, page 43-62. Springer, (2013)A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design., , and . ISC, volume 3650 of Lecture Notes in Computer Science, page 89-103. Springer, (2005)Reliability of VLSI Linear Arrays with Redundant Links., , and . IWDC, volume 3326 of Lecture Notes in Computer Science, page 326-337. Springer, (2004)A New Key-Predistribution Scheme for Highly Mobile Sensor Networks., and . ICDCN, volume 4904 of Lecture Notes in Computer Science, page 298-303. Springer, (2008)More on Combinatorial Batch Codes, and . CoRR, (2008)Revisiting Key Predistribution using Transversal Designs for a Grid-based Deployment Scheme., and . IJDSN, 5 (6): 660-674 (2009)