Ayday, E., Delgosha, F., & Fekri, F.(2012).Data authenticity and availability in multihop wireless sensor networks.ACM Transactions on Sensor Networks (TOSN),8(2),1--26.
Ayday, E., & Fekri, F.(2012).A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks.Ad Hoc Networks,10(7),1278--1290.
Ayday, E., & Fekri, F.(2012).An iterative algorithm for trust management and adversary detection for delay-tolerant networks.IEEE Transactions on Mobile Computing,11(9),1514--1531.
Ayday, E., & Fekri, F.(2012).A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks.Ad Hoc Networks,10(7),1278--1290.
Ayday, E., Delgosha, F., & Fekri, F.(2012).Data authenticity and availability in multihop wireless sensor networks.ACM Transactions on Sensor Networks (TOSN),8(2),10.
Ayday, E., & Fekri, F.(2011).Iterative trust and reputation management using belief propagation.IEEE Transactions on Dependable and Secure Computing,9(3),375--386.
Ayday, E., & Fekri, F.(2010).A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks.Ad Hoc Networks,8(2),181--192.
Ayday, E., & Fekri, F.(2010).A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks.Ad Hoc Networks,8(2),181--192.