Author of the publication

Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms.

, , , , and . J. Inf. Secur. Appl., (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multitarget Device-Free Localization via Cross-Domain Wi-Fi RSS Training Data and Attentional Prior Fusion., , , , , and . AAAI, page 91-99. AAAI Press, (2024)Learning nonlinear distance functions using neural network for regression with application to robust human age estimation.. ICCV, page 249-254. IEEE Computer Society, (2011)Decentralized Multi-robot Collision Avoidance Algorithm Based on RSSI., , , and . WCSP, page 1-5. IEEE, (2021)Joint Depth and Normal Estimation from Real-world Time-of-flight Raw Data., , , , and . IROS, page 71-78. IEEE, (2021)Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms., , , , and . J. Inf. Secur. Appl., (November 2023)Learning images using compositional pattern-producing neural networks for source camera identification and digital demographic diagnosis., , and . Pattern Recognit. Lett., 33 (4): 381-396 (2012)A visual attention model based on wavelet transform and its application on ship detection., , and . IGARSS, page 2202-2205. IEEE, (2012)A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation., , and . MM&Sec, page 125-130. ACM, (2009)Performance Evaluation of IPv4 and IPv6 on Windows Vista and Linux Ubuntu, , and . Networks Security, Wireless Communications and Trusted Computing, International Conference on, (2009)Super-Resolution Using Regularized Orthogonal Matching Pursuit Based on Compressed Sensing Theory in the Wavelet Domain.. CGIV, page 349-354. IEEE Computer Society, (2009)