Author of the publication

An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS.

, , , , , and . Comput. Syst. Sci. Eng., 45 (2): 1145-1165 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

5G wireless P2MP backhaul security protocol: an adaptive approach., , , , and . EURASIP J. Wirel. Commun. Netw., (2019)TrMAps: Trust Management in Specification-Based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System., , , , and . IEEE J. Biomed. Health Informatics, 25 (10): 3763-3775 (2021)Blockchain-Based Privacy Preservation Scheme for Misbehavior Detection in Lightweight IoMT Devices., , , , , and . IEEE J. Biomed. Health Informatics, 27 (2): 710-721 (February 2023)A Formally Verified Security Scheme for Inter-gNB-DU Handover in 5G Vehicle-to-Everything., , , , , , and . IEEE Access, (2021)Scrutinizing the Vulnerability of Ephemeral Diffie-Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches., , , , , and . Mob. Inf. Syst., (2021)An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS., , , , , and . Comput. Syst. Sci. Eng., 45 (2): 1145-1165 (2023)A lightweight D2D security protocol with request-forecasting for next-generation mobile networks., , , , , and . Connect. Sci., 34 (1): 362-386 (2022)Privacy-preserving transactive energy systems: Key topics and open research challenges., , , , , , , , , and 13 other author(s). CoRR, (2023)Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols., , , and . Sensors, 21 (24): 8383 (2021)Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone., , , , , and . Sensors, 21 (6): 2057 (2021)