Follow
Moazzam Khan
Title
Cited by
Cited by
Year
The cost of security: Performance of Zigbee key exchange mechanism in an 802.15. 4 beacon enabled cluster
M Khan, F Amini, J Misic, VB Misic
Mobile Adhoc and Sensor Systems (MASS), 2006 IEEE International Conference …, 2006
282006
Performance implications of periodic key exchanges and packet integrity overhead in an 802.15. 4 beacon enabled cluster
J Misic, F Amini, M Khan
International Journal of Sensor Networks 3 (1), 33-42, 2008
222008
Key exchange in 802.15. 4 networks and its performance implications
M Khan, F Amini, J Mišić
Mobile Ad-hoc and Sensor Networks, 497-508, 2006
122006
Security in IEEE 802.15. 4 cluster based networks
M Khan, J Misic
Security in Wireless Mesh Networks 6, 2008
112008
Performance of IEEE 802.15. 4 clusters with power management and key exchange
F Amini, M Khan, J Mišić, H Pourreza
Journal of Computer Science and Technology 23 (3), 377-388, 2008
112008
On Security Attacks in HealthcareWSNs Implemented on 802.15. 4 Beacon Enabled Clusters
J Misic, F Amini, M Khan
Consumer Communications and Networking Conference, 2007. CCNC 2007. 4th IEEE …, 2007
102007
Encyclopedia of Wireless and Mobile Communications
F Amini, M Khan, J Misic
3*
Performance of key distribution in 802.15. 4 Beacon Enabled Cluster
J Misic, M Khan, F Amini
Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE …, 2007
12007
Security in IEEE 802.15. 4 cluster based networks
M Khan, J Mišic
July, 2006
12006
Performance evaluation of security implementation in IEEE 802.15. 4 beacon enabled networks
M Khan
2009
Power Management and Security in IEEE 802.15. 4 Clusters: How to Balance?
F Amini, M Khan, J Mišić
Mobile Telemedicine: A Computing and Networking Perspective, 237, 2008
2008
IEEE802. 15.4 簇的能量管理和密钥交换机制性能分析
F Amini, M Khan, J Misic, H Pourreza
计算机科学技术学报 23 (3), 377-388, 2008
2008
Signature-based intrusion detection in healthcare wireless sensor networks implemented over IEEE 802.15. 4 beacon enabled clusters
J Mišic, F Amini, M Khan
The system can't perform the operation now. Try again later.
Articles 1–13