Author of the publication

Structural-based tunneling: preserving mutual anonymity for circular P2P networks.

, , , and . Int. J. Commun. Syst., 29 (3): 602-619 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new efficient authenticated multiple-key exchange protocol from bilinear pairings., , , and . Comput. Electr. Eng., 39 (2): 530-541 (2013)A Cluster-Based Vehicular Cloud Architecture with Learning-Based Resource Management., , and . CloudCom, page 162-167. IEEE Computer Society, (2014)Design and Implementation of an Image CoProcessor., , and . ICISP, volume 5099 of Lecture Notes in Computer Science, page 498-507. Springer, (2008)Counter attack to free-riders: Filling a security hole in BitTorrent protocol., , , , , and . ICNSC, page 128-133. IEEE, (2015)A cluster-based vehicular cloud architecture with learning-based resource management., , , and . J. Supercomput., 71 (4): 1401-1426 (2015)EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations., , and . ISeCure, 7 (2): 115-126 (2015)Light Weight Implementation of Stream Ciphers for M-Commerce Applications., , and . CoRR, (2014)C-trust: A trust management system to improve fairness on circular P2P networks., , , , and . Peer-to-Peer Netw. Appl., 9 (6): 1128-1144 (2016)A Novel Asymmetric Searchable Encryption Scheme with Granting search capability., , and . IACR Cryptol. ePrint Arch., (2020)Secure positioning for shipping containers in ports and terminals using WSN., , and . ISCISC, page 10-14. IEEE, (2014)