Security frameworks for wireless sensor networks-review G Sharma, S Bala, AK Verma Procedia Technology 6, 978-987, 2012 | 105 | 2012 |
PF-ID-2PAKA: pairing free identity-based two-party authenticated key agreement protocol for wireless sensor networks S Bala, G Sharma, AK Verma Wireless Personal Communications 87, 995-1012, 2016 | 32 | 2016 |
An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks. G Sharma, S Bala, AK Verma Int. J. Netw. Secur. 18 (1), 82-89, 2016 | 31 | 2016 |
Classification of Symmetric Key Management Schemes for Wireless Sensor Networks B Suman, G Sharma, A Verma International Journal of Security and Its Applications 7 (2), 117-137, 2013 | 25 | 2013 |
PF-IBS: pairing-free identity based digital signature algorithm for wireless sensor networks G Sharma, S Bala, AK Verma Wireless personal communications 97, 1185-1196, 2017 | 23 | 2017 |
Security in wireless sensor networks using frequency hopping G Sharma, S Bala, AK Verma, T Singh International Journal of Computer Applications 975, 8887, 2012 | 21 | 2012 |
Impersonation attack on CertificateLess key agreement protocol S Bala, G Sharma, AK Verma International Journal of Ad Hoc and Ubiquitous Computing 27 (2), 108-120, 2018 | 20 | 2018 |
Comparison of flooding and directed diffusion for wireless sensor network G Sharma, S Bala, AK Verma 2009 Annual IEEE India Conference, 1-4, 2009 | 17 | 2009 |
A twofold group key agreement protocol for NoC‐based MPSoCs G Sharma, V Kuchta, R Anand Sahu, S Ellinidou, S Bala, O Markowitch, ... Transactions on Emerging Telecommunications Technologies 30 (6), e3633, 2019 | 16 | 2019 |
Pairing-free certificateless ring signcryption (PF-CLRSC) scheme for wireless sensor networks G Sharma, S Bala, AK Verma Wireless Personal Communications 84, 1469-1485, 2015 | 16 | 2015 |
An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks S Bala, G Sharma, AK Verma ICITCS 2012, 2012 | 15 | 2012 |
A survey and taxonomy of symmetric key management schemes for wireless sensor networks S Bala, G Sharma, AK Verma Proceedings of the CUBE International Information Technology Conference, 585-592, 2012 | 14 | 2012 |
An Identity-based Ring Signcryption Scheme G Sharma, S Bala, AK Verma ICITCS 2012, 2012 | 14 | 2012 |
Authenticated group key agreement protocol without pairing G Sharma, RA Sahu, V Kuchta, O Markowitch, S Bala Information and Communications Security: 19th International Conference …, 2018 | 11 | 2018 |
A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks S Bala, AK Verma International Journal of Ad Hoc and Ubiquitous Computing 21 (2), 140-155, 2016 | 11 | 2016 |
On the security of certificateless signature schemes G Sharma, S Bala, AK Verma International Journal of Distributed Sensor Networks 9 (6), 102508, 2013 | 8 | 2013 |
On the security of authenticated group key agreement protocols S Bala, G Sharma, H Bansal, T Bhatia Scalable Computing: Practice and Experience 20 (1), 93-99, 2019 | 7 | 2019 |
Separate session key generation approach for network and application flows in LoRaWAN S Bala, D Barthel, S Gharout Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 870-879, 2019 | 6 | 2019 |
Extending certificateless authentication for wireless sensor networks: A novel insight G Sharma, S Bala, AK Verma International Journal of Computer Science Issues (IJCSI) 10 (6), 167, 2013 | 4 | 2013 |
Optimized elliptic curve cryptography for wireless sensor networks S Bala, G Sharma, AK Verma Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International …, 2012 | 4 | 2012 |