Author of the publication

An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks.

, , , and . Journal of Zhejiang University - Science C, 12 (7): 550-560 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Robin Rainer Herkert University of Stuttgart

Replication Code for: Greedy Kernel Methods for Approximating Breakthrough Curves for Reactive Flow from 3D Porous Geometry Data. Software, (2024)Related to: R. Herkert, P. Buchfink, T. Wenzel, B. Haasdonk, P. Toktaliev, O. Iliev (2024), "Greedy Kernel Methods for Approximating Breakthrough Curves for Reactive Flow from 3D Porous Geometry Data". arXiv: 2405.19170.
 

Other publications of authors with the same name

Securing software defined wireless networks., , and . IEEE Communications Magazine, 54 (1): 20-25 (2016)Privacy and incentive mechanisms in people-centric sensing networks., , and . IEEE Communications Magazine, 53 (10): 200-206 (2015)User privacy and data trustworthiness in mobile crowd sensing., , and . IEEE Wireless Commun., 22 (1): 28-34 (2015)Security and privacy in emerging networks: Part 1 Guest Editorial., , , , , and . IEEE Communications Magazine, 53 (4): 18-19 (2015)DiCode: DoS-Resistant and Distributed Code Dissemination in Wireless Sensor Networks., , , and . IEEE Trans. Wireless Communications, 11 (5): 1946-1956 (2012)Secure and efficient dynamic program update in wireless sensor networks., , , and . Security and Communication Networks, 5 (7): 823-830 (2012)How to Govern the Non-Cooperative Amateur Drones?, , , and . IEEE Network, 33 (3): 184-189 (2019)Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks., , , and . IEEE Communications Letters, 16 (8): 1270-1273 (2012)Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets., , , and . AsiaCCS, page 58-70. ACM, (2017)Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks., , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 421-435. Springer, (2015)