Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey., , and . Veh. Commun., (2019)A Secure User Authentication Protocol for Heterogeneous Mobile Environments., , , , , , , and . IEEE Access, (2022)Group Identification via Non-threshold Leakage-Resilient Secret Sharing Scheme., , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 234-241. Springer, (2019)Engineering Adaptive Authentication., , and . ACSOS-C, page 275-280. IEEE, (2021)The Analysis of MATE Attack in SDN Based on STRIDE Model., , , and . EIDWT, volume 17 of Lecture Notes on Data Engineering and Communications Technologies, page 901-910. Springer, (2018)PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT., , , and . Wireless Personal Communications, 113 (1): 313-335 (2020)A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme., , , , , and . Complex., (2020)Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms., , , , , , and . Entropy, 24 (4): 519 (2022)Fine-Grained Attribute-Based Encryption Scheme Supporting Equality Test., , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 220-233. Springer, (2018)Multiple-level threshold load balancing in distributed SDN controllers., , , , , and . Comput. Networks, (2021)