Author of the publication

Lightweight and Privacy-Preserving Charging Reservation Authentication Protocol for 5G-V2G.

, , , , and . IEEE Trans. Veh. Technol., 72 (6): 7871-7883 (June 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Partially latent factors based multi-view subspace learning., , , and . Comput. Intell., 38 (5): 1772-1801 (2022)Quantum network coding for general repeater networks., , , and . Quantum Inf. Process., 14 (9): 3533-3552 (2015)A Behavior Privacy Preserving Method towards RF Sensing., , , , , , and . IWQoS, page 1-10. IEEE, (2021)Seamless Group Pre-handover Authentication Scheme for 5G High-Speed Rail Network., , , , , , , and . SmartCom, volume 13202 of Lecture Notes in Computer Science, page 308-317. Springer, (2021)Advanced Analysis of Email Sender Spoofing Attack and Related Security Problems., , , , , and . CSCloud/EdgeCom, page 80-85. IEEE, (2022)Hierarchical Solution for Access Control and Authentication in Software Defined Networks., , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 70-81. Springer, (2014)Breaking the Throughput Limit of LED-Camera Communication via Superposed Polarization., , and . INFOCOM, page 1-10. IEEE, (2023)Hierarchical Identity-Based Broadcast Encryption., , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 242-257. Springer, (2014)Practical (fully) distributed signatures provably secure in the standard model., , , , , , and . Theor. Comput. Sci., (2015)Lightweight deep learning methods for panoramic dental X-ray image segmentation., , , , , and . Neural Comput. Appl., 35 (11): 8295-8306 (April 2023)