Author of the publication

Resource-efficient authentic key establishment in heterogeneous wireless sensor networks.

, , , and . J. Parallel Distrib. Comput., 73 (2): 235-249 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kifayat, Kashif
add a person with the name Kifayat, Kashif
 

Other publications of authors with the same name

Lightweight Sybil Attack Detection in MANETs., , , and . IEEE Systems Journal, 7 (2): 236-248 (2013)Group Authentication Scheme for Neighbourhood Area Networks (NANs) in Smart Grids., , , and . J. Sensor and Actuator Networks, 5 (2): 9 (2016)Hosting critical infrastructure services in the cloud environment considerations., , , and . IJCIS, 11 (4): 365-381 (2015)Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence., , and . ICIC (3), volume 10363 of Lecture Notes in Computer Science, page 203-212. Springer, (2017)A framework for physical health improvement using Wireless Sensor Networks and gaming., , , , and . PervasiveHealth, page 1-4. IEEE, (2009)Identity management in System-of-Systems Crisis Management situation., , , , , and . SoSE, page 37-42. IEEE, (2011)Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems., , , and . UIC/ATC, page 438-443. IEEE Computer Society, (2013)Replay Attack Impact on Advanced Metering Infrastructure (AMI)., , , and . SmartGIFT, volume 175 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 52-59. (2016)SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel., , , and . J. Inf. Secur. Appl., (2018)Risk assessment and attack graph generation for collaborative infrastructures: a survey., and . IJCCBS, 6 (3): 204-228 (2016)