From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks., , , и . IEEE Access, (2019)Efficient Search Over Encrypted Medical Data With Known-Plaintext/Background Models and Unlinkability., , , , , , и . IEEE Access, (2021)Secure Data Obfuscation Scheme to Enable Privacy-Preserving State Estimation in Smart Grid AMI Networks., , , , и . IEEE Internet Things J., 3 (5): 709-719 (2016)Investigating Public-Key Certificate Revocation in Smart Grid., , , и . IEEE Internet Things J., 2 (6): 490-503 (2015)Secure and Efficient AKA Scheme and Uniform Handover Protocol for 5G Network Using Blockchain., , , , и . IEEE Open J. Commun. Soc., (2021)Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs., , , и . ICC, стр. 7298-7303. IEEE, (2015)Privacy-Preserving mHealth Data Release with Pattern Consistency., , , и . GLOBECOM, стр. 1-6. IEEE, (2016)A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks., и . IEEE Trans. Parallel Distributed Syst., 23 (10): 1805-1818 (2012)Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings., , , , и . IEEE Syst. J., 15 (3): 4189-4198 (2021)Detecting Sybil Attacks Using Proofs of Work and Location in VANETs., , , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (1): 39-53 (2022)