Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy preservation for social networks sequential publishing., , and . Comput. Networks, (2020)Optimized in-network authentication against pollution attacks in software-defined-named data networking., , , and . J. Inf. Secur. Appl., (2020)H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming., , and . Comput. Secur., 24 (1): 57-68 (2005)Using ABE for Medical Data Protection in Fog Computing., , , and . ICEIS (2), page 155-161. SciTePress, (2019)An Efficient Federated Identity Management Protocol For Heterogeneous Fog computing Architecture., , and . SoftCOM, page 1-6. IEEE, (2022)A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things., , , and . J. Netw. Comput. Appl., (2020)Single-Path Network Coding Authentication for Software-Defined Named Data Networking., , and . AICCSA, page 1-8. IEEE Computer Society, (2019)Service Orchestration in Autonomous Vehicle Networks: Leveraging Vehicular Fog and Edge Computing., , and . SoftCOM, page 1-6. IEEE, (2023)PReDIHERO - Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring., , , and . AICCSA, page 1-8. IEEE, (2021)Cryptanalysis and Improvement of Identity-Based Multisignature Scheme., , , and . ICFNDS, page 19:1-19:5. ACM, (2019)