Author of the publication

Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View.

, , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (2): 1332-1346 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing., , and . CANS, volume 4301 of Lecture Notes in Computer Science, page 270-285. Springer, (2006)A pairing-free identity-based handover AKE protocol with anonymity in the heterogeneous wireless networks., , , and . Int. J. Commun. Syst., (2019)Dynamic modeling and multivariable control of organic Rankine cycles in waste heat utilizing processes., , , and . Comput. Math. Appl., 64 (5): 908-921 (2012)A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems., , and . Secur. Commun. Networks, 8 (6): 937-951 (2015)Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View., , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (2): 1332-1346 (2022)Security Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks., , , , and . IEEE Trans. Intell. Transp. Syst., 25 (1): 370-385 (January 2024)A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection., , , , and . Comput. Syst. Sci. Eng., 41 (3): 1043-1056 (2022)Chaotic Hash Function Based on Tandem-DM Construction., , and . TrustCom, page 1745-1749. IEEE Computer Society, (2011)Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards., , , and . Comput. Stand. Interfaces, 29 (5): 507-512 (2007)Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing., , , , and . Comput. Secur., (2023)