Author of the publication

Providing security and energy efficiency in wireless ad-hoc sensor networks through Secure Cluster-Head Election (SEC-CH-E).

, , and . TSP, page 47-51. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interference Mitigation in Cognitive-Radio-Based Femtocells., and . IEEE Communications Surveys and Tutorials, 17 (3): 1511-1534 (2015)Common Control Channel Security Framework for Cognitive Radio Networks., and . VTC Spring, IEEE, (2009)On the Usage of History for Energy Efficient Spectrum Sensing., and . IEEE Communications Letters, 19 (3): 407-410 (2015)IEEE Access Special Section: Advances in Interference Mitigation Techniques for Device-to-Device Communications., , , , and . IEEE Access, (2019)Threshold Power Based UE Admittance and Contention Free Resource Allocation for Interference Mitigation in Cognitive Femtocells., , and . Wireless Personal Communications, 95 (2): 1601-1616 (2017)History-Assisted Energy-Efficient Spectrum Sensing for Infrastructure-Based Cognitive Radio Networks., and . IEEE Trans. Vehicular Technology, 66 (3): 2462-2473 (2017)Performance Analysis of Improved IEEE 802.11 Infrastructure Power Saving Under Time-Correlated Channel Errors., and . IJWIN, 15 (1): 36-42 (2008)Keyless Security in Wireless Networks., and . Wireless Personal Communications, 79 (3): 1713-1731 (2014)Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNET., , , and . FIT, page 57-62. IEEE Computer Society, (2011)Shared-Key Based Secure MAC Protocol for CRNs., , and . NGMAST, page 266-271. IEEE, (2014)