Author of the publication

Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges.

, , and . IEEE Trans. Ind. Informatics, 19 (1): 867-869 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic Analysis: Resistance to Traffic Analysis Attacks in Tor System for Critical Infrastructures., , and . SMC, page 2832-2837. IEEE, (2018)POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems., , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 700-704. Springer, (2023)Wheels on the Modbus - Attacking ModbusTCP Communications., , and . WISEC, page 288-289. ACM, (2022)An Efficient Batch Verification Protocol for Value Added Services., and . SMC, page 1560-1565. IEEE, (2013)A secure approach for SMS in GSM network., and . CUBE, page 59-64. ACM, (2012)PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs., , , , and . Computer, 53 (7): 29-44 (2020)Integrated Distributed Authentication Protocol for Smart Grid Communications., and . IEEE Syst. J., 12 (3): 2545-2556 (2018)Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges., , and . IEEE Trans. Ind. Informatics, 19 (1): 867-869 (2023)A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification., , , , and . IET Cyper-Phys. Syst.: Theory & Appl., 8 (3): 160-185 (September 2023)Secure-AKA: An Efficient AKA Protocol for UMTS Networks., and . Wireless Personal Communications, 78 (2): 1345-1373 (2014)