2012 journal article
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 15(2).
2012 journal article
Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks
AD HOC NETWORKS, 10(7), 1204–1220.
2010 journal article
A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption
Turkish Journal of Electrical Engineering and Computer Sciences, 18(1), 1–21.
2009 article
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 219–228.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.