Author of the publication

Efficient Privacy-Preserving Authentication Scheme With Fine-Grained Error Location for Cloud-Based VANET.

, , , , and . IEEE Trans. Veh. Technol., 70 (10): 10436-10449 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Lifetime Optimization by KKT Optimality Conditions in Wireless Sensor Networks., , , , and . Wireless Personal Communications, 49 (2): 179-196 (2009)On composition and decomposition of networks., , , , , , and . BMEI, page 783-788. IEEE, (2015)A Hot-Area-Based Selfish Routing Protocol for Mobile Social Networks., and . IJDSN, (2013)A local search enhanced differential evolutionary algorithm for sparse recovery., , , , , , and . Appl. Soft Comput., (2017)A Dual-Chamber Serial-Parallel Piezoelectric Pump with an Integrated Sensor for Flow Rate Measurement., , , , , , and . Sensors, 19 (6): 1447 (2019)Application of the extended simplest equation method to the coupled Schrödinger-Boussinesq equation., , and . Appl. Math. Comput., (2013)A semi-analytical solution for the transport of solutes with complex sequences of first-order reactions., and . Comput. Geosci., (2019)Dynamic Event-Triggered Passive Synchronization for Mode-Dependent Persistent Dwell-Time Switched Neural Networks Subject to DoS Attacks., , , and . Neural Process. Lett., 55 (9): 12421-12436 (December 2023)Network lifetime maximization with cross-layer design in wireless sensor networks., , , , and . IEEE Trans. Wirel. Commun., 7 (10): 3759-3768 (2008)On-Demand Security Architecture for Cloud Computing., , and . Computer, 45 (7): 73-78 (2012)