Author of the publication

Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks.

, , , , and . ISA, volume 76 of Communications in Computer and Information Science, page 233-240. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communication., , , , and . Computers & Mathematics with Applications, 60 (2): 198-208 (2010)Estimating Twitter User Location Using Social Interactions-A Content Based Approach., , and . SocialCom/PASSAT, page 838-843. IEEE Computer Society, (2011)Lattice-based signcryption., , , and . Concurrency and Computation: Practice and Experience, 25 (14): 2112-2122 (2013)MapIt: a case study for location driven knowledge discovery and mining., , and . IJDMMM, 5 (1): 57-75 (2013)Subjectivity classification and analysis of the ASRS corpus., , and . IRI, page 160-165. IEEE Systems, Man, and Cybernetics Society, (2011)Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device., , , and . BICS, volume 7888 of Lecture Notes in Computer Science, page 271-277. Springer, (2013)Chaotic and AES cryptosystem for satellite imagery.. Telecommunication Systems, 52 (2): 573-581 (2013)Spam Trapping System: Novel security framework to fight against spam botnets., , , , and . ICT, page 467-471. IEEE, (2014)Editorial "Secure Multimedia Communication in Vehicular Adhoc Network"., , , and . Multimedia Tools Appl., 66 (2): 161-164 (2013)Polymorphic Malware Detection Using Hierarchical Hidden Markov Model., , and . DASC, page 151-155. IEEE Computer Society, (2011)