A Uniform Projection Method for Motif Discovery in DNA Sequences
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
A Construction of Optimal Constant Composition Codes
Designs, Codes and Cryptography
Location-aware key predistribution scheme for wide area wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Combinatorial design of key distribution mechanisms for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Generalized mix functions and orthogonal equitable rectangles
Designs, Codes and Cryptography
ACM Transactions on Information and System Security (TISSEC)
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Characterization of routers using combinatorial designs
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Energy conservation in wireless sensor networks: A survey
Ad Hoc Networks
CQS-Pair: Cyclic Quorum System Pair for Wakeup Scheduling in Wireless Sensor Networks
OPODIS '08 Proceedings of the 12th International Conference on Principles of Distributed Systems
Mathematical Methods in Computer Science
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Key Predistribution Schemes Using Codes in Wireless Sensor Networks
Information Security and Cryptology
A quorum-based framework for establishing control channels in dynamic spectrum access networks
Proceedings of the 15th annual international conference on Mobile computing and networking
User-private information retrieval based on a peer-to-peer community
Data & Knowledge Engineering
Note: On the Cameron--Praeger conjecture
Journal of Combinatorial Theory Series A
Constructions of new orthogonal arrays and covering arrays of strength three
Journal of Combinatorial Theory Series A
Securing wireless sensor networks against large-scale node capture attacks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Decentralized detector generation in cooperative intrusion detection systems
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
New bounds on the total-squared-correlation of quaternary signature sets and optimal designs
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Rapid sequence homology assessment by subsampling the genome space using difference sets
IEEE Transactions on Information Theory - Special issue on information theory in molecular biology and neuroscience
Combinatorial Designs for Authentication and Secrecy Codes
Foundations and Trends in Communications and Information Theory
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
Hamilton cycles in restricted block-intersection graphs
Designs, Codes and Cryptography
CLIMA'11 Proceedings of the 12th international conference on Computational logic in multi-agent systems
Product construction of key distribution schemes for sensor networks
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Deterministic key predistribution schemes for distributed sensor networks
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Constructions of covering arrays of strength five
Designs, Codes and Cryptography
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design
ISC'05 Proceedings of the 8th international conference on Information Security
Construction of two level orthogonal arrays via solutions of linear systems
CASC'05 Proceedings of the 8th international conference on Computer Algebra in Scientific Computing
Combinatorial structures for design of wireless sensor networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
A hybrid design of key pre-distribution scheme for wireless sensor networks
ICISS'05 Proceedings of the First international conference on Information Systems Security
Two classes of optimal two-dimensional OOCs
Designs, Codes and Cryptography
100% connectivity for location aware code based KPD in clustered WSN: merging blocks
ISC'12 Proceedings of the 15th international conference on Information Security
Key predistribution schemes for distributed sensor networks via block designs
Designs, Codes and Cryptography
Journal of Electrical and Computer Engineering - Special issue on Resource Allocation in Communications and Computing
Almost Hadamard matrices: The case of arbitrary exponents
Discrete Applied Mathematics
Copysets: reducing the frequency of data loss in cloud storage
USENIX ATC'13 Proceedings of the 2013 USENIX conference on Annual Technical Conference
Hi-index | 0.00 |