Author of the publication

Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge.

, , , and . IJAHUC, 20 (4): 262-273 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Cloud Storage System from Threshold Encryption., , and . INCoS, page 541-545. IEEE, (2013)New attribute-based authentication and its application in anonymous cloud access service., , and . IJWGS, 11 (1): 125-141 (2015)Provably Secure Group Key Management Approach Based upon Hyper-Sphere., , , , , and . IEEE Trans. Parallel Distrib. Syst., 25 (12): 3253-3263 (2014)Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge., , , and . IJAHUC, 20 (4): 262-273 (2015)Advances in secure and intelligent data processing., , , and . Concurrency and Computation: Practice and Experience, 26 (5): 1021-1022 (2014)New Publicly Verifiable Databases with Efficient Updates., , , , and . IEEE Trans. Dependable Sec. Comput., 12 (5): 546-556 (2015)Provably secure user authentication and key agreement scheme for wireless sensor networks., , , , , and . Security and Communication Networks, 9 (16): 3670-3687 (2016)Improved handover authentication and key pre-distribution for wireless mesh networks., , , and . Concurrency and Computation: Practice and Experience, 28 (10): 2978-2990 (2016)Efficient and short certificateless signatures secure against realistic adversaries., , and . The Journal of Supercomputing, 55 (2): 173-191 (2011)Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks., , , and . IJSN, 5 (1): 35-44 (2010)