Author of the publication

Secure data aggregation without persistent cryptographic operations in wireless sensor networks.

, , , and . IPCCC, IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Licklider transmission protocol (LTP)-based DTN for cislunar communications., , , , and . IEEE/ACM Trans. Netw., 19 (2): 359-368 (2011)Adaptive Two-Point Modulation of Wireless Phase Locked Loops., and . IEEE Trans. Contr. Sys. Techn., 20 (3): 804-807 (2012)Pseudo-atoms of fuzzy and non-fuzzy measures., and . Fuzzy Sets and Systems, 158 (11): 1258-1272 (2007)Secure data aggregation without persistent cryptographic operations in wireless sensor networks., , , and . Ad Hoc Networks, 5 (1): 100-111 (2007)Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications., , , and . Ad Hoc Networks, 7 (8): 1489-1500 (2009)Existence and iteration of positive solutions for a multipoint one-dimensional p-Laplacian boundary value problem., , and . Applied Mathematics and Computation, 197 (1): 389-398 (2008)Virtual Learning Services over 3D Internet: Patterns and Case Studies., , , and . IEEE SCC (2), page 213-219. IEEE Computer Society, (2008)A 65nm CMOS SoC with embedded HSDPA/EDGE transceiver, digital baseband and multimedia processor., , , , , , , , , and 13 other author(s). ISSCC, page 368-370. IEEE, (2011)Research on the Application of Multi-Agent to the Telecontrol Communication for Power System., , , and . PACIIA (2), page 743-747. IEEE Computer Society, (2008)978-0-7695-3490-9.Simulation Modeling and Analysis of a Multi-resource Medical Clinic., , and . CyberC, page 593-600. IEEE Computer Society, (2011)