Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kamat, Pandurang
add a person with the name Kamat, Pandurang
 

Other publications of authors with the same name

Secure, pseudonymous, and auditable communication in vehicular ad hoc networks., , and . Security and Communication Networks, 1 (3): 233-244 (2008)ORBIT Measurements Framework and Library (OML): Motivations, Design, Implementation, and Feature., , , and . TRIDENTCOM, page 146-152. IEEE Computer Society, (2005)Temporal Privacy in Wireless Sensor Networks., , , and . ICDCS, page 23. IEEE Computer Society, (2007)Temporal privacy in wireless sensor networks: Theory and practice., , , and . TOSN, 5 (4): 28:1-28:24 (2009)An identity-based security framework For VANETs., , and . Vehicular Ad Hoc Networks, page 94-95. ACM, (2006)Enhancing Source-Location Privacy in Sensor Network Routing., , , and . ICDCS, page 599-608. IEEE Computer Society, (2005)Lurking in the Shadows: Identifying Systemic Threats to Kernel Data., , and . IEEE Symposium on Security and Privacy, page 246-251. IEEE Computer Society, (2007)Service Discovery and Device Identification in Cognitive Radio Networks., , , and . SECON, page 670-677. IEEE, (2007)Performance Evaluation of the Quorum Blockchain Platform., , , and . CoRR, (2018)Integration of heterogeneous networking testbeds., , , , , , and . TRIDENTCOM, page 27. ICST, (2008)