Author of the publication

An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology.

, , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visualization of big data security: a case study on the KDD99 cup data set., , , , and . Digit. Commun. Networks, 3 (4): 250-259 (2017)A cyber-threat analytic model for autonomous detection of virtual property theft., , and . Inf. Comput. Secur., 25 (4): 358-381 (2017)An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology., , , , and . IEEE Access, (2019)Gathering Intelligence on Student Information Behavior Using Data Mining., , , , , , , , and . Libr. Trends, 68 (4): 636-658 (2020)Deep learning algorithms for cyber security applications: A survey., , , , , and . J. Comput. Secur., 29 (5): 447-471 (2021)Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments., , and . TrustCom, page 177-184. IEEE Computer Society, (2012)Virtual World Security Inspection., and . J. Networks, 7 (6): 895-907 (2012)An Efficient Dynamic Group-Based Batch Verification Scheme for Vehicular Sensor Networks., , , , , and . FNSS, volume 1113 of Communications in Computer and Information Science, page 52-64. Springer, (2019)A Multidiscipline Approach to Governing Virtual Property Theft in Virtual Worlds., and . HCC, volume 328 of IFIP Advances in Information and Communication Technology, page 161-171. Springer, (2010)A Direct Insight into Victims of Cybercrime., , and . TrustCom/ISPA/IUCC, page 603-610. IEEE Computer Society, (2013)