has been cited by the following article(s):
[1]
|
An energy-aware routing protocol for wireless sensor network based on genetic algorithm
Telecommunication Systems,
2017
DOI:10.1007/s11235-017-0348-6
|
|
|
[2]
|
SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs
Telecommunication Systems,
2016
DOI:10.1007/s11235-015-0047-0
|
|
|
[3]
|
Intelligent Data analysis and its Applications, Volume I
Advances in Intelligent Systems and Computing,
2014
DOI:10.1007/978-3-319-07776-5_17
|
|
|
[4]
|
Network and System Security
Lecture Notes in Computer Science,
2014
DOI:10.1007/978-3-319-11698-3_17
|
|
|
[5]
|
A Complete Hierarchical Key Management Scheme for Heterogeneous Wireless Sensor Networks
The Scientific World Journal,
2014
DOI:10.1155/2014/816549
|
|
|
[6]
|
On the Improvement of Wiener Attack on RSA with Small Private Exponent
The Scientific World Journal,
2014
DOI:10.1155/2014/650537
|
|
|
[7]
|
Intelligent Data analysis and its Applications, Volume I
Advances in Intelligent Systems and Computing,
2014
DOI:10.1007/978-3-319-07776-5_16
|
|
|
[8]
|
Intelligent Data analysis and its Applications, Volume I
Advances in Intelligent Systems and Computing,
2014
DOI:10.1007/978-3-319-07776-5_17
|
|
|
[9]
|
Intelligent Data analysis and its Applications, Volume I
Advances in Intelligent Systems and Computing,
2014
DOI:10.1007/978-3-319-07776-5_16
|
|
|
[10]
|
Recent Trends in Applied Artificial Intelligence
Lecture Notes in Computer Science,
2013
DOI:10.1007/978-3-642-38577-3_49
|
|
|