Seguir
Suman Bala
Suman Bala
Dirección de correo verificada de thapar.edu
Título
Citado por
Citado por
Año
Security frameworks for wireless sensor networks-review
G Sharma, S Bala, AK Verma
Procedia Technology 6, 978-987, 2012
1022012
An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks.
G Sharma, S Bala, AK Verma
Int. J. Netw. Secur. 18 (1), 82-89, 2016
312016
PF-ID-2PAKA: pairing free identity-based two-party authenticated key agreement protocol for wireless sensor networks
S Bala, G Sharma, AK Verma
Wireless Personal Communications 87, 995-1012, 2016
302016
Classification of Symmetric Key Management Schemes for Wireless Sensor Networks
B Suman, G Sharma, A Verma
International Journal of Security and Its Applications 7 (2), 117-137, 2013
252013
PF-IBS: pairing-free identity based digital signature algorithm for wireless sensor networks
G Sharma, S Bala, AK Verma
Wireless personal communications 97, 1185-1196, 2017
222017
Security in wireless sensor networks using frequency hopping
G Sharma, S Bala, AK Verma, T Singh
International Journal of Computer Applications 975, 8887, 2012
212012
Impersonation attack on CertificateLess key agreement protocol
S Bala, G Sharma, AK Verma
International Journal of Ad Hoc and Ubiquitous Computing 27 (2), 108-120, 2018
172018
Comparison of flooding and directed diffusion for wireless sensor network
G Sharma, S Bala, AK Verma
2009 Annual IEEE India Conference, 1-4, 2009
162009
A twofold group key agreement protocol for NoC‐based MPSoCs
G Sharma, V Kuchta, R Anand Sahu, S Ellinidou, S Bala, O Markowitch, ...
Transactions on Emerging Telecommunications Technologies 30 (6), e3633, 2019
152019
An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks
S Bala, G Sharma, AK Verma
ICITCS 2012, 2012
152012
Pairing-free certificateless ring signcryption (PF-CLRSC) scheme for wireless sensor networks
G Sharma, S Bala, AK Verma
Wireless Personal Communications 84, 1469-1485, 2015
142015
A survey and taxonomy of symmetric key management schemes for wireless sensor networks
S Bala, G Sharma, AK Verma
Proceedings of the CUBE International Information Technology Conference, 585-592, 2012
142012
An Identity-based Ring Signcryption Scheme
G Sharma, S Bala, AK Verma
ICITCS 2012, 2012
132012
Authenticated group key agreement protocol without pairing
G Sharma, RA Sahu, V Kuchta, O Markowitch, S Bala
Information and Communications Security: 19th International Conference …, 2018
112018
A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks
S Bala, AK Verma
International Journal of Ad Hoc and Ubiquitous Computing 21 (2), 140-155, 2016
112016
On the security of certificateless signature schemes
G Sharma, S Bala, AK Verma
International Journal of Distributed Sensor Networks 9 (6), 102508, 2013
82013
On the security of authenticated group key agreement protocols
S Bala, G Sharma, H Bansal, T Bhatia
Scalable Computing: Practice and Experience 20 (1), 93-99, 2019
72019
Separate session key generation approach for network and application flows in LoRaWAN
S Bala, D Barthel, S Gharout
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 870-879, 2019
62019
Extending certificateless authentication for wireless sensor networks: A novel insight
G Sharma, S Bala, AK Verma
International Journal of Computer Science Issues (IJCSI) 10 (6), 167, 2013
42013
Optimized elliptic curve cryptography for wireless sensor networks
S Bala, G Sharma, AK Verma
Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International …, 2012
42012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20