Author of the publication

Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey.

, , , , and . J. Inf. Secur. Appl., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security., , , , , , and . Sensors, 19 (14): 3119 (2019)Reliability, Security, and Privacy in Power Grids., , , , and . Computer, 55 (9): 85-88 (2022)ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network., and . Telecommun. Syst., 66 (3): 481-503 (2017)Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-Enabled IoTs: An Anticipatory Study., , , , and . ICC Workshops, page 1253-1258. IEEE, (2023)Reliability Analysis of Fault Tolerant Memory Systems., , , , and . CoRR, (2023)The Security Aspects of Automotive Over-the-Air Updates., , and . Int. J. Cyber Warf. Terror., 10 (2): 64-81 (2020)Digitization of healthcare sector: A study on privacy and security concerns., , , and . ICT Express, 9 (4): 571-588 (August 2023)FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things., , , , , and . J. Parallel Distributed Comput., (2022)A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues., , , , , , , and . Future Internet, 14 (1): 19 (2022)Security and Privacy in Fog Computing: Challenges., , , , , , and . IEEE Access, (2017)