Author of the publication

Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.

, , , , , and . IEEE Internet Things J., 5 (4): 2496-2505 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A model for sentiment and emotion analysis of unstructured social media text., , , , , and . Electron. Commer. Res., 18 (1): 181-199 (2018)Trust Erosion: Dealing with Unknown-Unknowns in Cloud Security., , and . IEEE Cloud Comput., 5 (4): 24-32 (2018)Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment., , , , and . IEEE Internet of Things Journal, 7 (4): 3041-3052 (2020)Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things., , , , and . IEEE Trans. Ind. Informatics, 14 (2): 759-767 (2018)An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System., , , , and . Secur. Commun. Networks, (2018)Exploring Factors Influencing the Use of Enterprise Social Networks in Multinational Professional Service Firms., , and . J. Organ. Comput. Electron. Commer., 25 (3): 289-315 (2015)Cloud computing and its implications for cybercrime investigations in Australia., , and . Comput. Law Secur. Rev., 29 (2): 152-163 (2013)Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN., , , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 467-477. Springer, (2015)The Way Forward., and . Digital Forensic Education, volume 61 of Studies in Big Data, Springer, (2020)International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021)., , , , , and . CIKM, page 4886-4887. ACM, (2021)