Author of the publication

Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V.

, , , , , , , and . IEEE Trans. Veh. Technol., 72 (11): 15028-15039 (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A color image watermarking algorithm resistant to print-scan., , , , and . WCNIS, page 518-521. IEEE, (2010)A lightweight password-based authentication protocol using smart card., , , and . Int. J. Commun. Syst., (2017)Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things., , , , , and . SocialSec, volume 1095 of Communications in Computer and Information Science, page 95-109. Springer, (2019)Intelligent Preprocessing Selection for Pavement Crack Detection based on Deep Reinforcement Learning., , , , , and . SEKE, page 458-463. KSI Research Inc., (2021)WELID: A Weighted Ensemble Learning Method for Network Intrusion Detection., , and . ISCC, page 399-404. IEEE, (2023)Optimizing the Trapping (Transport) Efficiency in Regular Branched Networks., , and . IEEE Trans. Netw. Sci. Eng., 9 (3): 1308-1318 (2022)CrowdLBM: A lightweight blockchain-based model for mobile crowdsensing in the Internet of Things., , , and . Pervasive Mob. Comput., (2022)Differential Fault Attack on ITUbee Block Cipher., , , , and . ACM Trans. Embed. Comput. Syst., 16 (2): 54:1-54:10 (2017)Robust App Clone Detection Based on Similarity of UI Structure., , , , , and . IEEE Access, (2020)Ethereum Name Service: the Good, the Bad, and the Ugly., , , , , and . CoRR, (2021)