Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice., , and . WISA, volume 7690 of Lecture Notes in Computer Science, page 296-311. Springer, (2012)A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks., , , , and . WISA, volume 8909 of Lecture Notes in Computer Science, page 216-227. Springer, (2014)A Simple Yet Efficient Approach to Combat Transaction Malleability in Bitcoin., , , , and . WISA, volume 8909 of Lecture Notes in Computer Science, page 27-37. Springer, (2014)DeepDist: A Deep-Learning-Based IoV Framework for Real-Time Objects and Distance Violation Detection., , , , , and . IEEE Internet Things Mag., 3 (3): 30-34 (2020)Evolution of Friendship: a case study of MobiClique., , , and . Conf. Computing Frontiers, page 267-270. ACM, (2017)A Comparative Analysis of Distributed Ledger Technologies for Smart Contract Development., , , , , , and . PIMRC, page 1-6. IEEE, (2019)Conditional proxy re-encryption for secure big data group sharing in cloud environment., , , and . INFOCOM Workshops, page 541-546. IEEE, (2014)Internet of vehicles: Integrated services over vehicular ad hoc networks, , and . International Conference on Smart Cities, Infrastructure, Technologies and Applications, page 61--73. Springer, (2017)Autonomous Cars: Social and Economic Implications., , and . IT Prof., 20 (6): 70-77 (2018)Named Data Networking's Intrinsic Cyber-Resilience for Vehicular CPS., , , and . IEEE Access, (2018)