Author of the publication

Analysis of outage performance in a 6G-V2X communications system utilising free-space optical quantum key distribution.

, , , and . IET Quantum Commun., 4 (4): 191-199 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks., , , , , and . IEEE Internet Things J., 5 (4): 2496-2505 (2018)Physical characteristics of wireless communication channels for secret key establishment: A survey of the research., , , , and . Comput. Secur., (2018)Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors., , and . Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, Elsevier, (2017)Adaptive and Optimum Secret Key Establishment for Secure Vehicular Communications., , , , and . IEEE Trans. Veh. Technol., 70 (3): 2310-2321 (2021)A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol., , , , and . IOTSMS, page 1-8. IEEE, (2022)Towards an Evaluation Framework for Extended Reality Authentication Schemes., , and . CHI Extended Abstracts, page 339:1-339:6. ACM, (2024)Adaptive Traffic Fingerprinting for Darknet Threat Intelligence., , , and . CoRR, (2018)Anonymity networks and the fragile cyber ecosystem., , and . Netw. Secur., 2016 (3): 10-18 (2016)Security in Online Games: Current Implementations and Challenges., , , , and . Handbook of Big Data and IoT Security, Springer, (2019)Cyberstalking: Investigating formal intervention and the role of Corporate Social Responsibility., , , , and . Telematics Informatics, 34 (4): 339-349 (2017)