Author of the publication

Secure dynamic routing protocols based on Cross-Layer Network Security Evaluation.

, , and . PIMRC, page 303-308. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-Layered Dynamic Key Management in Mobile and Long-Lived Cluster-Based Wireless Sensor Networks., , , , and . WCNC, page 4145-4150. IEEE, (2007)Node capability aware resource provisioning in a heterogeneous cloud., and . ICCC, page 46-50. IEEE, (2012)A QoS-driven approach for service-oriented device anycasting in ubiquitous environments., , and . Computer Networks, 52 (18): 3342-3357 (2008)Service-Oriented Device Composition in Resource Constrained Ubiquitous Environments., , , and . WCNC, page 3110-3115. IEEE, (2008)A threshold-based key generation approach for ciphertext-policy attribute-based encryption., , and . ICUFN, page 908-913. IEEE, (2015)An Efficient Mobile AR Navigation System Using Polygon Approximation Based Data Acquisition., and . WICON, volume 264 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 215-224. Springer, (2018)eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks., , and . Computer Networks, 51 (4): 1151-1168 (2007)Teaching large-scale image processing over worldwide network cameras., , and . DSP, page 726-729. IEEE, (2015)Secure dynamic routing protocols based on Cross-Layer Network Security Evaluation., , and . PIMRC, page 303-308. IEEE, (2012)Harvest the Information from Multimedia Big Data in Global Camera Networks., , and . BigMM, page 184-191. IEEE Computer Society, (2015)