Author of the publication

Relay vehicle based access network selection scheme for Vehicular Ad Hoc Network.

, , , and . WCSP, page 1-6. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobility management in VANET., , and . WOCC, page 298-303. IEEE, (2013)Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available Information., , , and . ICISSP, page 373-378. SciTePress, (2018)Sequence aware functional encryption and its application in searchable encryption., , , , and . J. Inf. Secur. Appl., (2017)A new efficient optimistic fair exchange protocol without random oracles., , , and . Int. J. Inf. Sec., 11 (1): 53-63 (2012)A lattice-based public key encryption scheme with delegated equality test., , , , and . Comput. Stand. Interfaces, (January 2024)Post-quantum secure group signature with verifier local revocation and backward unlinkability., , , , and . Comput. Stand. Interfaces, (March 2024)Signature Scheme from Trapdoor Functions., , , , and . J. Internet Serv. Inf. Secur., 9 (2): 31-41 (2019)Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification., , , , and . Comput. J., 62 (8): 1166-1177 (2019)Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test., , , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 448-467. Springer, (2018)Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search., , , , and . Inscrypt (2), volume 14527 of Lecture Notes in Computer Science, page 356-367. Springer, (2023)