Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SOS: Secure Overlay Sensornets., , and . PerCom Workshops, page 548-553. IEEE Computer Society, (2007)ID-MAC: An identity-based MAC protocol for Wireless Sensor Networks., , , , and . ISCC, page 975-981. IEEE Computer Society, (2013)TinyTate: Identity-Based Encryption for Sensor Networks., , , , , and . IACR Cryptology ePrint Archive, (2007)P2P over MANETs., , , , and . Mobile Peer-to-Peer Computing, IGI Global, (2009)Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks., , , , , , , and . Comput. J., 55 (4): 384-396 (2012)Secure-TWS: Authenticating node to multi-user communication in shared sensor networks., , , , and . IPSN, page 289-300. IEEE Computer Society, (2009)NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks., , , , and . EWSN, volume 4913 of Lecture Notes in Computer Science, page 305-320. Springer, (2008)Efficient implementation of elliptic curve cryptography in wireless sensors., , , and . Adv. in Math. of Comm., 4 (2): 169-187 (2010)SMOV: Array Bound-Check and access in a single instruction., , , , and . CCNC, page 745-751. IEEE, (2016)Wireless Sensor Network Security., , , and . IJDSN, (2013)