Author of the publication

On the Limitations of Security Concepts for Mobile Adhoc Networks Routing Protocols.

, , , and . DFN-Arbeitstagung über Kommunikationsnetze, volume P-55 of LNI, page 61-76. GI, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identities in the Future Internet of Things., and . Wireless Personal Communications, 49 (3): 353-363 (2009)Protecting digital identities in future networks., , , and . Future Network & Mobile Summit, page 1-8. IEEE, (2011)Privacy-enabled identity management in the Future Internet., , and . Future Internet Assembly, page 57-66. IOS Press, (2009)Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks., , and . ICC, page 2288-2295. IEEE, (2006)MobiSplit in a Virtualized, Multi-Device Environment., , , , , and . ICC, page 1839-1845. IEEE, (2007)TRIMS, a privacy-aware trust and reputation model for identity management systems., , and . Computer Networks, 54 (16): 2899-2912 (2010)Secure Comparison of Encrypted Data in Wireless Sensor Networks., , and . WiOpt, page 47-53. IEEE Computer Society, (2005)Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation., , and . IEEE Trans. Mob. Comput., 5 (10): 1417-1431 (2006)Linking Ad Hoc Charging Schemes to AAAC Architectures., , , , and . ESAS, volume 3313 of Lecture Notes in Computer Science, page 66-81. Springer, (2004)A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing., , , and . Computer Communications, 31 (4): 734-749 (2008)