|
Search the dblp DataBase
Abedelaziz Mohaisen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Abedelaziz Mohaisen, DaeHun Nyang
Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] EWSN, 2006, pp:83-98 [Conf]
- DaeHun Nyang, Abedelaziz Mohaisen
Cooperative Public Key Authentication Protocol in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP] UIC, 2006, pp:864-873 [Conf]
- Jeonil Kang, DaeHun Nyang, Abedelaziz Mohaisen, Young-Geun Choi, KoonSoon Kim
Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2007, pp:886-899 [Conf]
- YoungJae Maeng, Abedelaziz Mohaisen, DaeHun Nyang
Secret Key Revocation in Sensor Networks. [Citation Graph (0, 0)][DBLP] UIC, 2007, pp:1222-1232 [Conf]
Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network. [Citation Graph (, )][DBLP]
On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network. [Citation Graph (, )][DBLP]
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. [Citation Graph (, )][DBLP]
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network. [Citation Graph (, )][DBLP]
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network. [Citation Graph (, )][DBLP]
Privacy in Location Based Services: Primitives Toward the Solution. [Citation Graph (, )][DBLP]
A Survey on Deep Packet Inspection for Intrusion Detection Systems [Citation Graph (, )][DBLP]
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks [Citation Graph (, )][DBLP]
Privacy Preserving Association Rule Mining Revisited [Citation Graph (, )][DBLP]
A computationally-efficient construction for the matrix-based key distribution in sensor network [Citation Graph (, )][DBLP]
Privacy in Location Based Services: Primitives Toward the Solution [Citation Graph (, )][DBLP]
Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering [Citation Graph (, )][DBLP]
Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering [Citation Graph (, )][DBLP]
Search in 0.155secs, Finished in 0.156secs
|