Author of the publication

On the Security of a Threshold Anonymous Authentication Protocol for VANETs.

, , , and . SpaCCS, volume 10066 of Lecture Notes in Computer Science, page 145-155. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Human-in-the-loop optimization for vehicle body lightweight design., , , , , , , , and . Adv. Eng. Informatics, (2024)An integrated retrieval framework for similar questions: Word-semantic embedded label clustering - LDA with question life cycle., , , , , and . Inf. Sci., (2020)KAP: Knowledge-Graph Based Auxiliary Platform for Outcome-Based Python Education., , , , and . ICCSE (3), volume 1813 of Communications in Computer and Information Science, page 98-110. Springer, (2022)ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure., , , and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 83-100. (2016)Design of Novel Adipose Tissue Mimicking Phantom Material for Liposuction Training., , , , , and . CISP-BMEI, page 1-9. IEEE, (2021)Acquisition and Analysis of Liposuction Force Signal and Design of a Fat-Mimicking Phantom for Liposuction Training., , , , , and . ICBET, page 87-91. ACM, (2021)Forgeability Attack of Two DLP-Base Proxy Blind Signature Schemes., , , and . ICSI (2), volume 6729 of Lecture Notes in Computer Science, page 395-402. Springer, (2011)Asynchronous Slepian-Wolf code design., , , and . ISIT, page 869-873. IEEE, (2009)On the Security of a Threshold Anonymous Authentication Protocol for VANETs., , , and . SpaCCS, volume 10066 of Lecture Notes in Computer Science, page 145-155. (2016)LDGM-based codes for successive refinement., , , and . Allerton, page 1518-1524. IEEE, (2009)