Author of the publication

Designing Logical Topology for Wireless Sensor Networks: A Multi-Chain Oriented Approach

. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), 4 (1): 20 (February Charles Sturt University, Australia)
DOI: 10.5121/ijasuc.2013.4101

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers., , and . Sensors, 23 (18): 7678 (September 2023)Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks., , and . Int. J. Wirel. Networks Broadband Technol., 4 (1): 29-44 (2015)A Qualitative Comparison of Different Logical Topologies for Wireless Sensor Networks.. Sensors, 12 (11): 14887-14913 (2012)A Robust Data Gathering Technique for Large Scaled Wireless Sensor Networks., and . J. Networks, 9 (9): 2342-2352 (2014)A Group Mutual Exclusion protocol for the Use Case of IoT-Blockchain Integration In Work-Safe Scenario., and . CCWC, page 25-30. IEEE, (2020)A Key Management Scheme for Establishing an Encryption-Based Trusted IoT System., and . CHASE, page 41-46. IEEE, (2019)Designing Logical Topology for Wireless Sensor Networks: A Multi-Chain Oriented Approach. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), 4 (1): 20 (February 2013)Cloud Security from Users Point of View: A Pragmatic Study with Thematic Analysis., and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 127-140. Springer, (2014)A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System., , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 141-156. Springer, (2014)Current Lightweight Cryptography Protocols in Smart City IoT Networks: A Survey., , and . CoRR, (2020)