Author of the publication

A comprehensive pseudonym changing scheme for improving location privacy in vehicular networks.

, , and . Internet Things, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Techniques for Efficient Traffic Grooming in WDM Mesh Networks., , , and . ICCCN, page 303-308. IEEE, (2007)Routing and Wavelength Assignment for Prioritized Demands Under a Scheduled Traffic Model., and . BROADNETS, IEEE, (2006)Minimizing attack radius of scheduled connections in WDM networks., , and . CCECE, page 1-4. IEEE, (2017)Optimal regenerator placement in survivable translucent networks., , , and . DRCN, page 1-7. IEEE, (2014)Optimal priority-based lightpath allocation for survivable WDM networks., and . ICCCN, page 17-22. IEEE, (2004)Regenerator allocation for scheduled lightpath demands in translucent optical networks., and . ICNC, page 292-296. IEEE Computer Society, (2012)On a virtual wavelength translation scheme for routing in all-optical networks., , and . IPCCC, page 403-411. IEEE, (1999)Identifying Vulnerabilities and Attacking Capabilities Against Pseudonym Changing Schemes in VANET., , and . ISDDC, volume 11317 of Lecture Notes in Computer Science, page 1-15. Springer, (2018)Path Protection in Translucent WDM Optical Networks., , , , and . ICDCN, volume 5935 of Lecture Notes in Computer Science, page 392-403. Springer, (2010)Speed Based Distributed Congestion Control Scheme for Vehicular Networks., and . ISCC, page 1-4. IEEE, (2020)