Author of the publication

Towards Secure Communication in CR-VANETs Through a Trust-Based Routing Protocol.

, , , and . INFOCOM Workshops, page 1-6. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure., and . SECRYPT, page 84-93. SciTePress, (2012)Efficient and Low-Cost RFID Authentication Schemes, , and . CoRR, (2012)KIMAP: Key-Insulated Mutual Authentication Protocol for RFID, and . CoRR, (2012)Efficient and Low-Cost RFID Authentication Schemes., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (3): 4-25 (2011)Towards A Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart Cities., , , , , , and . TrustCom, page 1291-1296. IEEE, (2020)Integrating Blockchain With Artificial Intelligence for Privacy-Preserving Recommender Systems., , , and . IEEE Trans. Netw. Sci. Eng., 8 (2): 1009-1018 (2021)CRAB: Blockchain Based Criminal Record Management System., , , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 294-303. Springer, (2018)On the Leakage Resilient Cryptography in Game-Theoretic Settings., , and . Trustcom/BigDataSE/ISPA, page 1984-1989. IEEE, (2016)Dynamic attribute-based signcryption without random oracles., , and . Int. J. Appl. Cryptogr., 2 (3): 199-211 (2012)Privacy-Preserving Data Mining: A Game-Theoretic Approach., and . DBSec, volume 6818 of Lecture Notes in Computer Science, page 186-200. Springer, (2011)