Author of the publication

A Probabilistic Key Management Protocol based on Kryptograph for WSN

. International Journal of Computer Networks and Applications (IJCNA), 2 (2): 76-83 (April 2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of the Virtual Lab Module for Understanding the Concepts of Electric and Magnetic Field Patterns in Rectangular Waveguides and Cavities., , , , and . Int. J. Online Eng., 8 (3): 12-21 (2012)VaxiBERT: A BERT-Based Classifier for Vaccine Tweets with Multi-Label Annotations., , , and . FIRE (Working Notes), volume 3681 of CEUR Workshop Proceedings, page 59-66. CEUR-WS.org, (2023)Key Pre-distribution Scheme for WSNs., and . Ad Hoc Sens. Wirel. Networks, 23 (1-2): 47-67 (2014)MalAnalyser: An effective and efficient Windows malware detection method based on API call sequences., , and . Expert Syst. Appl., (November 2023)An effective ransomware detection approach in a cloud environment using volatile memory features., and . J. Comput. Virol. Hacking Tech., 18 (4): 407-424 (2022)A Probabilistic Key Management Protocol based on Kryptograph for WSN. International Journal of Computer Networks and Applications (IJCNA), 2 (2): 76-83 (April 2015)A Compact Ultra-Wideband Antenna with Truncated Ground for 5G Applications., and . ICIIS, page 571-574. IEEE, (2020)Reproducibility of quantitative tractography methods applied to cerebral white matter., , , , , , , , , and 3 other author(s). NeuroImage, 36 (3): 630-644 (2007)The Leap Speaker Recognition System for NIST SRE 2018 Challenge., , , , , , and . ICASSP, page 5771-5775. IEEE, (2019)Online Time Sharing Policy in Energy Harvesting Cognitive Radio Network with Channel Uncertainty., , and . GLOBECOM, page 1-6. IEEE, (2017)