Author of the publication

Resource-efficient authentic key establishment in heterogeneous wireless sensor networks.

, , , and . J. Parallel Distrib. Comput., 73 (2): 235-249 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building robust models for small data containing nominal inputs and continuous outputs based on possibility distributions., , and . Int. J. Machine Learning & Cybernetics, 10 (10): 2805-2822 (2019)MNPA: a mobile network privacy architecture., , and . Computer Communications, 23 (18): 1777-1788 (2000)Resource-efficient authentic key establishment in heterogeneous wireless sensor networks., , , and . J. Parallel Distrib. Comput., 73 (2): 235-249 (2013)Pypette: A Platform for the Evaluation of Live Digital Forensics., , and . IJDCF, 4 (4): 31-46 (2012)Scalable Distributed Signature Detection., , , and . WDFIA, page 27-37. Plymouth University, UK, (2012)A Flexible Approach to Secure and Fair Document Exchange., , and . Comput. J., 42 (7): 569-581 (1999)Dynamic Device Configuration in Ubiquitous Environments., , and . ICGS3, volume 92 of Communications in Computer and Information Science, page 263-273. Springer, (2010)Towards Energy-Efficient Intrusion Detection in Pervasive Computing., , and . ICC, page 1417-1422. IEEE, (2007)A New Prime and Probe Cache Side-Channel Attack for Cloud Computing., , , and . CIT/IUCC/DASC/PICom, page 1718-1724. IEEE, (2015)A Compose Language-Based Framework for Secure Service Composition., , , , , and . CyberSecurity, page 195-202. IEEE Computer Society, (2012)