Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Masood, Ashraf
add a person with the name Masood, Ashraf
 

Other publications of authors with the same name

Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol., , and . NBiS, page 260-267. IEEE Computer Society, (2009)Arcanum : A Secure and Efficient Key Exchange Protocol for the Internet., and . ITCC (1), page 17-21. IEEE Computer Society, (2004)An efficient key distribution scheme for heterogeneous sensor networks., , and . IWCMC, page 388-392. ACM, (2007)Key Management and Secure Routing in Heterogeneous Sensor Networks., , and . WiMob, page 549-554. IEEE Computer Society, (2008)An efficient collusion resistant security mechanism for heterogeneous sensor networks., , , and . Internet Research, 19 (2): 227-245 (2009)Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks., , , , and . IJDSN, (2014)Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks., , , and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 1-11. Springer, (2007)Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication., , and . ISA, volume 76 of Communications in Computer and Information Science, page 198-208. Springer, (2010)Scalable and efficient key management for heterogeneous sensor networks., , , and . The Journal of Supercomputing, 45 (1): 44-65 (2008)Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment., , , and . J. Medical Systems, 40 (7): 161:1-161:13 (2016)