Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cryptographic Perspective to Achieve Practical Physical Layer Security., , and . GLOBECOM, page 4038-4043. IEEE, (2022)An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems., , , , and . EURASIP J. Wirel. Commun. Netw., (2016)Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices., , , , , and . CAMAD, page 173-178. IEEE, (2022)PKI Security in Large-Scale Healthcare Networks., , and . J. Medical Systems, 36 (3): 1107-1116 (2012)Distributed Trusted Authority-based Key Management for Beyond 5G Network Coding-enabled Mobile Small Cells., , , and . 5G World Forum, page 80-85. IEEE, (2019)HIDROID: Prototyping a Behavioral Host-Based Intrusion Detection and Prevention System for Android., , , , and . IEEE Access, (2020)A Hyperledger Fabric-based Blockchain Architecture to Secure IoT-based Health Monitoring Systems., , , , and . MeditCom, page 186-190. IEEE, (2021)An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks., , , and . Int. J. Inf. Sec., 16 (6): 627-639 (2017)A Signature Scheme with Unlinkable-yet-Accountable Pseudonymity for Privacy-Preserving Crowdsensing., , , , and . IEEE Trans. Mob. Comput., 19 (4): 752-768 (2020)Security Threats in Network Coding-Enabled Mobile Small Cells., , , , and . BROADNETS, volume 263 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 337-346. Springer, (2018)