Follow
Suman Bala
Suman Bala
Verified email at thapar.edu
Title
Cited by
Cited by
Year
Security frameworks for wireless sensor networks-review
G Sharma, S Bala, AK Verma
Procedia Technology 6, 978-987, 2012
1052012
PF-ID-2PAKA: pairing free identity-based two-party authenticated key agreement protocol for wireless sensor networks
S Bala, G Sharma, AK Verma
Wireless Personal Communications 87, 995-1012, 2016
322016
An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks.
G Sharma, S Bala, AK Verma
Int. J. Netw. Secur. 18 (1), 82-89, 2016
312016
Classification of Symmetric Key Management Schemes for Wireless Sensor Networks
B Suman, G Sharma, A Verma
International Journal of Security and Its Applications 7 (2), 117-137, 2013
252013
PF-IBS: pairing-free identity based digital signature algorithm for wireless sensor networks
G Sharma, S Bala, AK Verma
Wireless personal communications 97, 1185-1196, 2017
232017
Security in wireless sensor networks using frequency hopping
G Sharma, S Bala, AK Verma, T Singh
International Journal of Computer Applications 975, 8887, 2012
212012
Impersonation attack on CertificateLess key agreement protocol
S Bala, G Sharma, AK Verma
International Journal of Ad Hoc and Ubiquitous Computing 27 (2), 108-120, 2018
202018
Comparison of flooding and directed diffusion for wireless sensor network
G Sharma, S Bala, AK Verma
2009 Annual IEEE India Conference, 1-4, 2009
172009
A twofold group key agreement protocol for NoC‐based MPSoCs
G Sharma, V Kuchta, R Anand Sahu, S Ellinidou, S Bala, O Markowitch, ...
Transactions on Emerging Telecommunications Technologies 30 (6), e3633, 2019
162019
Pairing-free certificateless ring signcryption (PF-CLRSC) scheme for wireless sensor networks
G Sharma, S Bala, AK Verma
Wireless Personal Communications 84, 1469-1485, 2015
162015
An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks
S Bala, G Sharma, AK Verma
ICITCS 2012, 2012
152012
A survey and taxonomy of symmetric key management schemes for wireless sensor networks
S Bala, G Sharma, AK Verma
Proceedings of the CUBE International Information Technology Conference, 585-592, 2012
142012
An Identity-based Ring Signcryption Scheme
G Sharma, S Bala, AK Verma
ICITCS 2012, 2012
142012
Authenticated group key agreement protocol without pairing
G Sharma, RA Sahu, V Kuchta, O Markowitch, S Bala
Information and Communications Security: 19th International Conference …, 2018
112018
A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks
S Bala, AK Verma
International Journal of Ad Hoc and Ubiquitous Computing 21 (2), 140-155, 2016
112016
On the security of certificateless signature schemes
G Sharma, S Bala, AK Verma
International Journal of Distributed Sensor Networks 9 (6), 102508, 2013
82013
On the security of authenticated group key agreement protocols
S Bala, G Sharma, H Bansal, T Bhatia
Scalable Computing: Practice and Experience 20 (1), 93-99, 2019
72019
Separate session key generation approach for network and application flows in LoRaWAN
S Bala, D Barthel, S Gharout
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 870-879, 2019
62019
Extending certificateless authentication for wireless sensor networks: A novel insight
G Sharma, S Bala, AK Verma
International Journal of Computer Science Issues (IJCSI) 10 (6), 167, 2013
42013
Optimized elliptic curve cryptography for wireless sensor networks
S Bala, G Sharma, AK Verma
Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International …, 2012
42012
The system can't perform the operation now. Try again later.
Articles 1–20