Secure Sharing of Data for Dynamic Group in Public Cloud.
Int. J. Netw. Secur., 2020
Design of Key Management Protocols for Internet of Things.
Int. J. Netw. Secur., 2020
Secure and Efficient Authentication Protocol for Power System Computer Networks.
Int. J. Netw. Secur., 2018
A Lightweight Authentication Protocol in Smart Grid.
Int. J. Netw. Secur., 2018
A Group Key Management Protocol for Mobile Devices.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018
(WIP) Authenticated Key Management Protocols for Internet of Things.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018
A Novice Group Sharing Method for Public Cloud.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
Efficient authentication for fast handover in wireless mesh networks.
Comput. Secur., 2013
Efficient Group Key Management in Wireless LANs.
Proceedings of the Third FTRA International Conference on Mobile, 2012
Secure Routing for Wireless Mesh Networks.
Int. J. Netw. Secur., 2011
Fast authentication for mobility support in wireless mesh networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks.
Trans. Comput. Sci., 2010
Fast authentication for mobile clients in wireless mesh networks.
Proceedings of the 23rd Canadian Conference on Electrical and Computer Engineering, 2010
Location-based design for secure and efficient wireless sensor networks.
Comput. Networks, 2008
Key management for role hierarchy in distributed systems.
J. Netw. Comput. Appl., 2007
Group key management in wireless mesh networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007
An XML-Based Administration Method on Role-Based Access Control in Distributed Systems.
Int. J. Comput. Their Appl., 2004
Access control in a hierarchy using one-way hash functions.
Comput. Secur., 2004