Author of the publication

A secure anonymous routing protocol with authenticated key exchange for ad hoc networks.

, , , and . Comput. Stand. Interfaces, 29 (5): 521-527 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT., and . GLOBECOM, page 1-6. IEEE, (2017)A sybil attack detection scheme for privacy-preserving mobile social networks., and . ICICS, page 1-5. IEEE, (2015)Designing efficient proxy signature schemes for mobile communication., , and . Sci. China Ser. F Inf. Sci., 51 (2): 183-195 (2008)Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers., , , , and . IEEE Trans. Dependable Secur. Comput., 15 (1): 27-39 (2018)Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque., , and . CANS, volume 4301 of Lecture Notes in Computer Science, page 153-167. Springer, (2006)Scalable Privacy-Preserving Query Processing over Ethereum Blockchain., , , , , and . Blockchain, page 398-404. IEEE, (2019)Achieving Efficient and Privacy-Preserving Top-k Query Over Vertically Distributed Data Sources., , , and . ICC, page 1-6. IEEE, (2019)Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing., , , , and . WCSP, page 1-6. IEEE, (2019)Secure sharing and searching for real-time video data in mobile cloud., , , , , and . IEEE Netw., 29 (2): 46-50 (2015)Grant Free Age-Optimal Random Access Protocol for Satellite-Based Internet of Things., , , , and . IEEE Trans. Commun., 70 (6): 3947-3961 (2022)