Search results for: Nitesh Saxena
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 4 > 901 - 913
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Ad Hoc and Sensor Network Security > 375-389
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 9 > 1970 - 1983
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > Network Security > 362-379
Lecture Notes in Computer Science > Cryptology and Network Security > Wireless and Sensor Network Security II > 443-462
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Key Exchange > 34-52
Lecture Notes in Computer Science > Privacy Enhancing Technologies > Privacy Enhancing Technologies Symposium > 19-37
Lecture Notes in Computer Science > NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems > Ad Hoc Networks II > 1083-1095
Lecture Notes in Computer Science > Security and Cryptography for Networks > Authentication and Key Agreement > 253-270
Lecture Notes in Computer Science > Cryptology and Network Security > Wireless and Sensor Network Security I > 154-173
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2010 > Network and Mobile Security > 233-251
Lecture Notes in Computer Science > Information and Communications Security > System Security > 311-327
Lecture Notes in Computer Science > Radio Frequency Identification: Security and Privacy Issues > Session 1 > 2-21
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 11 > 2270 - 2283