The SCEAS System
Navigation Menu

Search the dblp DataBase


Abedelaziz Mohaisen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Abedelaziz Mohaisen, DaeHun Nyang
    Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EWSN, 2006, pp:83-98 [Conf]
  2. DaeHun Nyang, Abedelaziz Mohaisen
    Cooperative Public Key Authentication Protocol in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:864-873 [Conf]
  3. Jeonil Kang, DaeHun Nyang, Abedelaziz Mohaisen, Young-Geun Choi, KoonSoon Kim
    Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:886-899 [Conf]
  4. YoungJae Maeng, Abedelaziz Mohaisen, DaeHun Nyang
    Secret Key Revocation in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:1222-1232 [Conf]

  5. Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network. [Citation Graph (, )][DBLP]

  6. On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network. [Citation Graph (, )][DBLP]

  7. Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. [Citation Graph (, )][DBLP]

  8. Data Randomization for Lightweight Secure Data Aggregation in Sensor Network. [Citation Graph (, )][DBLP]

  9. A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network. [Citation Graph (, )][DBLP]

  10. Privacy in Location Based Services: Primitives Toward the Solution. [Citation Graph (, )][DBLP]

  11. A Survey on Deep Packet Inspection for Intrusion Detection Systems [Citation Graph (, )][DBLP]

  12. Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks [Citation Graph (, )][DBLP]

  13. Privacy Preserving Association Rule Mining Revisited [Citation Graph (, )][DBLP]

  14. A computationally-efficient construction for the matrix-based key distribution in sensor network [Citation Graph (, )][DBLP]

  15. Privacy in Location Based Services: Primitives Toward the Solution [Citation Graph (, )][DBLP]

  16. Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering [Citation Graph (, )][DBLP]

  17. Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering [Citation Graph (, )][DBLP]

Search in 0.155secs, Finished in 0.156secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002