Author of the publication

Privacy-Preserving Proxy Re-Encryption With Decentralized Trust Management for MEC-Empowered VANETs.

, , , , , and . IEEE Trans. Intell. Veh., 8 (8): 4105-4119 (August 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Agent Graph Reinforcement Learning Based On-Demand Wireless Energy Transfer in Multi-UAV-Aided IoT Network., , , , and . WiOpt, page 1-8. IEEE, (2023)A Data Fusion Approach to Context-Aware Service Delivery in Heterogeneous Network Environments., and . ANT/MobiWIS, volume 5 of Procedia Computer Science, page 312-319. Elsevier, (2011)Automatic Street Parking Space Detection Using Visual Information and Convolutional Neural Networks., , , , , , , and . ICCE, page 1-2. IEEE, (2022)A network coding scheme to improve throughput for IEEE 802.11 WLAN., , , and . QSHINE, page 90-93. IEEE, (2014)Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks., , , and . CSE (2), page 787-794. IEEE Computer Society, (2009)Optimized Anonymity Updating in VANET Based on Information and Privacy Joint Metrics., , , , , and . DIVANet@MSWiM, page 63-69. ACM, (2018)Multiple tags identification for short id rfid networks., and . CCIS, page 1117-1122. IEEE, (2012)Resource Allocation for Energy Efficient NOMA UAV Network under Imperfect CSI., , , , and . ICC, page 1-6. IEEE, (2020)Energy-Efficient Secure NOMA-Enabled Mobile Edge Computing Networks., , , , , and . ICC, page 1-6. IEEE, (2019)When Exploiting Individual User Preference Is Beneficial for Caching at Base Stations., , and . ICC Workshops, page 1-6. IEEE, (2018)