Author of the publication

Vehicle-Key: A Secret Key Establishment Scheme for LoRa-enabled IoV Communications.

, , , , , , , and . ICDCS, page 787-797. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On BC-trees and BC-subtrees, , , and . CoRR, (2013)Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery., , , , , , , and . IACR Cryptol. ePrint Arch., (2023)Deep metric learning with mirror attention and fine triplet loss for fundus image retrieval in ophthalmology., , , , , , , , , and 1 other author(s). Biomed. Signal Process. Control., 80 (Part): 104277 (2023)The Internet Traffic Classification an Online SVM Approach., , , and . ICOIN, page 1-5. IEEE, (2008)Indoor Positioning Algorithm Based on Parallel Multilayer Neural Network, , , and . 2016 International Conference on Information System and Artificial Intelligence (ISAI), (2016)A Real-Time Video-based Eye Tracking Approach for Driver Attention Study., and . Comput. Informatics, 31 (4): 805- (2012)Secure Mobile Two-Factor Authentication Leveraging Active Sound Sensing., , , , , , , and . IEEE Trans. Mob. Comput., 23 (2): 1262-1277 (February 2024)A privacy-aware visual query approach for location-based data., , , , , , , and . Comput. Graph., (October 2023)Corrigendum to "Subtrees of spiro and polyphenyl hexagonal chains" Applied Mathematics and Computation 268(2015) 547-560., , , and . Appl. Math. Comput., (2016)Exploiting Jamming-Caused Neighbor Changes for Jammer Localization., , , and . IEEE Trans. Parallel Distributed Syst., 23 (3): 547-555 (2012)