Author of the publication

Proposing a Secure Self-Fining Vehicle Using Blockchain and Vehicular Edge Computing.

, , , and . IEEE Consumer Electron. Mag., 11 (2): 28-35 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recent advances in cloud data centers toward fog data centers., , , and . Concurr. Comput. Pract. Exp., (2019)Auditing Big Data Storage in Cloud Computing Using Divide and Conquer Tables., , and . IEEE Trans. Parallel Distributed Syst., 29 (5): 999-1012 (2018)Privacy-Preserving and Security in SDN-Based IoT: A Survey., , , , and . IEEE Access, (2023)Cloud resource allocation schemes: review, taxonomy, and opportunities., , , , , , and . Knowl. Inf. Syst., 50 (2): 347-381 (2017)Proposing a Secure Self-Fining Vehicle Using Blockchain and Vehicular Edge Computing., , , and . IEEE Consumer Electron. Mag., 11 (2): 28-35 (2022)Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing., , , , , , , and . IEEE Veh. Technol. Mag., 12 (3): 55-64 (2017)Intelligent Networking for Energy Harvesting Powered IoT Systems., , , , , and . ACM Trans. Sens. Networks, 20 (2): 45:1-45:31 (March 2024)Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions., , , , , , , , and . J. Netw. Comput. Appl., (2015)Remote Data Auditing in Cloud Computing Environments: A Survey, Taxonomy, and Open Issues., , , , , , and . ACM Comput. Surv., 47 (4): 65:1-65:34 (2015)Attribute-based data access control in mobile cloud computing: Taxonomy and open issues., , , , and . Future Gener. Comput. Syst., (2017)