Author of the publication

A Secure Key Management Model for Wireless Mesh Networks.

, , , , and . AINA, page 655-660. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communication Using Antennas Fabricated in Silicon Integrated Circuits., , , , , , and . IEEE J. Solid State Circuits, 42 (8): 1678-1687 (2007)A Parallel Evolutionary Algorithm with Value Decomposition for Multi-agent Problems., , and . ICSI, volume 12145 of Lecture Notes in Computer Science, page 616-627. Springer, (2020)Constrained Region-Growing and Edge Enhancement Towards Automated Semantic Video Object Segmentation., , and . ACIVS, volume 4179 of Lecture Notes in Computer Science, page 323-331. Springer, (2006)Heterogeneous Information Integration in Hierarchical Text Classification., , , and . PAKDD, volume 3918 of Lecture Notes in Computer Science, page 240-249. Springer, (2006)Security-reliability performance of cognitive AF relay-based wireless communication system with channel estimation error., , , and . EURASIP J. Adv. Signal Process., (2014)A semantic case based web 2.0 tag hierarchy construction framework., , , and . FSKD, page 616-622. IEEE, (2014)The Current Distribution of Microstrip Spiral Antenna in Biological Stratified Media., and . BMEI, page 1-4. IEEE, (2009)Mining Clustering Algorithm in Wireless Sensor Networks., , , and . GrC, page 178-182. IEEE, (2008)Bayesian compressive spectrum sensing joint DOA estimation and polarization signal processing., , , , and . WPMC, page 579-584. IEEE, (2017)Oscillation criteria for even-order half-linear functional differential equations with damping., , and . Appl. Math. Lett., 24 (10): 1709-1715 (2011)