Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks., , , , and . IEEE Internet of Things Journal, 7 (4): 3462-3473 (2020)A Lightweight and Secure Data Authentication Scheme with Privacy Preservation for Wireless Sensor Networks., , and . NaNA, page 210-217. IEEE Computer Society, (2016)OpenVDAP: An Open Vehicular Data Analytics Platform for CAVs., , , , , , and . ICDCS, page 1310-1320. IEEE Computer Society, (2018)Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT., , , , and . IEEE Trans. Ind. Electron., 68 (12): 12921-12929 (2021)A New AES S-Box Equation System Based on BES., , , and . J. Inf. Hiding Multim. Signal Process., 6 (6): 1177-1184 (2015)Decomposition and Composition of Sequence Diagrams., , and . TASE, page 76-83. IEEE Computer Society, (2018)Dataset for Evaluation of DDoS Attacks Detection in Vehicular Ad-Hoc Networks., , , , , and . WASA (3), volume 13473 of Lecture Notes in Computer Science, page 249-260. Springer, (2022)Accelerating Knuth-Morris-Pratt String Matching over LZ77 Compressed Text., , , , and . DCC, page 372. IEEE, (2021)TCNN: Two-Way Convolutional Neural Network for Image Steganalysis., , , , and . SecureComm (1), volume 335 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 509-514. Springer, (2020)Multi-factor based session secret key agreement for the Industrial Internet of Things., , , , , and . Ad Hoc Networks, (2023)