Author of the publication

Compromise-resilient anti-jamming communication in wireless sensor networks.

, , , and . Wireless Networks, 17 (6): 1513-1527 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network., , and . IJSN, 2 (3/4): 202-215 (2007)Multi-objective software assignment for active cyber defense., , and . CNS, page 299-307. IEEE, (2015)An Algorithm for Jammer Localization in Wireless Sensor Networks., , and . AINA, page 724-731. IEEE Computer Society, (2012)Permlyzer: Analyzing permission usage in Android applications., , and . ISSRE, page 400-410. IEEE Computer Society, (2013)Sensor Code Attestation., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Anonymous Routing., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms., and . Peer-to-Peer Computing, page 61-70. IEEE Computer Society, (2007)Practical Broadcast Authentication in Sensor Networks., , , and . MobiQuitous, page 118-132. IEEE Computer Society, (2005)Detecting Remote Exploits Using Data Mining., , , , , and . IFIP Int. Conf. Digital Forensics, volume 285 of IFIP, page 177-189. Springer, (2008)Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks., , , , and . SECON, page 131-139. IEEE, (2013)