Author of the publication

A Privacy Protection Scheme for Vehicle's Location Based on Virtual Location and Route Confusion.

, , , and . iThings/GreenCom/CPSCom/SmartData, page 190-194. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks., , , , and . IEEE Internet of Things Journal, 7 (4): 3462-3473 (2020)Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (11): 2805-2818 (2019)Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT., , , , and . IEEE Trans. Ind. Electron., 68 (12): 12921-12929 (2021)A New AES S-Box Equation System Based on BES., , , and . J. Inf. Hiding Multim. Signal Process., 6 (6): 1177-1184 (2015)Multi-factor based session secret key agreement for the Industrial Internet of Things., , , , , and . Ad Hoc Networks, (2023)Towards Multi-User, Secure, and Verifiable $k$NN Query in Cloud Database., , , , , , and . IEEE Trans. Knowl. Data Eng., 35 (9): 9333-9349 (September 2023)An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System., , , , , , and . IEEE Syst. J., 16 (4): 6569-6580 (2022)Isolation Modeling and Analysis Based on Mobility., , , , , , and . ACM Trans. Softw. Eng. Methodol., 28 (2): 10:1-10:31 (2019)Achieving Revocable Attribute Group-Based Encryption for Mobile Cloud Data: A Multi-Proxy Assisted Approach., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 2988-3001 (July 2023)PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 722-735 (2021)