Author of the publication

Lightweight Secure Communication Mechanism Towards UAV Networks.

, , , , , , , , and . GLOBECOM Workshops, page 1-6. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SADUS: Secure data deletion in user space for mobile devices., , , and . Comput. Secur., (2018)Selfholding: A combined attack model using selfish mining with block withholding attack., , , , , and . Comput. Secur., (2019)DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing., , , , and . Future Gener. Comput. Syst., (2018)Antitampering Scheme of Evidence Transfer Information in Judicial System Based on Blockchain., , , , , , and . Secur. Commun. Networks, (2022)Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization., , , , , , , , , and 1 other author(s). CCS, page 764-778. ACM, (2021)Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3621-3639 (2022)Privacy-preserving Diverse Keyword Search and Online Pre-diagnosis in Cloud Computing., , , , and . SERVICES, page 19. IEEE, (2021)Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET., , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (11): 13108-13122 (November 2023)Practical Secret Sharing Scheme Realizing Generalized Adversary Structure., and . J. Comput. Sci. Technol., 19 (4): 564-569 (2004)An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment., , , and . IEICE Trans. Inf. Syst., 93-D (3): 430-437 (2010)