Author of the publication

User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential.

, , and . ACM Trans. Manag. Inf. Syst., 13 (4): 44:1-44:21 (December 2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IA-CTR: Integrity-Aware Conventional Counter Mode for Secure and Efficient Communication in Wireless Sensor Networks., and . Wireless Personal Communications, 94 (3): 467-479 (2017)Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions., , , and . IEEE Consumer Electronics Magazine, 8 (3): 10-16 (2019)Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks.. J. Inf. Secur. Appl., (2017)Design, analysis and implementation of a smart next generation secure shipping infrastructure using autonomous robot., , , and . Comput. Networks, (2021)E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System., , , and . CoRR, (2022)Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap., , , , and . IEEE Access, (2021)Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices., and . IEEE Internet Things J., 6 (1): 580-589 (2019)The Language's Impact on the Enigma Machine., and . IACR Cryptol. ePrint Arch., (2021)PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment., , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1095-1107 (2021)IAR-CTR and IAR-CFB: integrity aware real-time based counter and cipher feedback modes., and . Secur. Commun. Networks, 8 (18): 3939-3952 (2015)