Author of the publication

SI-AKAV: Secure integrated authentication and key agreement for cellular-connected IoT devices in vehicular social networks.

, , , , and . Trans. Emerg. Telecommun. Technol., (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Location-aware IDPS scheme for Network Coding-enabled Mobile Small Cells., , , , and . 5G World Forum, page 91-96. IEEE, (2019)An efficient MAC-signature scheme for authentication in XOR network coding., , , and . ISCC, page 1-5. IEEE Computer Society, (2014)Analysis of a Homomorphic MAC-based scheme against tag pollution in RLNC-enabled wireless networks., , , , , and . CAMAD, page 156-160. IEEE, (2015)An Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC., , and . IEEE Communications Letters, 20 (5): 918-921 (2016)Machine Learning to Automate Network Segregation for Enhanced Security in Industry 4.0., , , , , , and . BROADNETS, volume 263 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 149-158. Springer, (2018)A Novel Intrusion Detection and Prevention Scheme for Network Coding-Enabled Mobile Small Cells., , , , , , and . IEEE Trans. Comput. Social Systems, 6 (6): 1467-1477 (2019)A null space-based MAC scheme against pollution attacks to Random linear Network Coding., , , , and . ICC Workshops, page 1521-1526. IEEE, (2015)SI-AKAV: Secure integrated authentication and key agreement for cellular-connected IoT devices in vehicular social networks., , , , and . Trans. Emerg. Telecommun. Technol., (April 2024)Security Framework for the Semiconductor Supply Chain Environment., , , , , , and . BROADNETS, volume 263 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 159-168. Springer, (2018)An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks., , , and . Int. J. Inf. Sec., 16 (6): 627-639 (2017)