Biblio
“Security analysis and evaluation of random linear network coding under wiretapping attack”, Journal of Digital Information Management, vol. 11, no. 6, pp. 446 - 452, 2013.
, “SERCID: A secure mechanism for data collection in wireless sensor networks”, Journal of Digital Information Management, vol. 10, no. 2, pp. 79 - 85, 2012.
, “True: A trust evaluation service for mobile ad hoc networks resistant to malicious attacks”, Journal of Digital Information Management, vol. 10, no. 4, pp. 262 - 271, 2012.
, “A practical U-healthcare network with security and QoS”, Journal of Digital Information Management, vol. 9, no. 2, pp. 87 - 94, 2011.
, “V-isoNet: A virtualised and isolated network using open source technologies”, Journal of Digital Information Management, vol. 8, no. 2, pp. 95 - 100, 2010.
, “A new authentication scheme for session initiation protocol”, Journal of Digital Information Management, vol. 7, no. 3, pp. 133 - 136, 2009.
,