Author of the publication

Scrutinizing the Vulnerability of Ephemeral Diffie-Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches.

, , , , , and . Mob. Inf. Syst., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cost-Aware Route Selection in Wireless Mesh Networks., , , , and . MSN, volume 4325 of Lecture Notes in Computer Science, page 171-184. Springer, (2006)A survey of NETLMM in all-IP-based wireless networks., , and . Mobility Conference, page 60. ACM, (2008)Scrutinizing the Vulnerability of Ephemeral Diffie-Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches., , , , , and . Mob. Inf. Syst., (2021)Efficient Compression Algorithm for H.264/AVC Intra-prediction Using an Activity Map., , , , and . IMIS, page 202-206. IEEE Computer Society, (2014)Content-Based Image Retrieval Using Wavelet Spatial-Color and Gabor Normalized Texture in Multi-resolution Database., , and . IMIS, page 371-377. IEEE Computer Society, (2012)DWLT compression method based on MSVQ for a real-time ECG monitoring system in WSNs., , , and . Mobility Conference, page 78. ACM, (2008)5G and beyond telco cloud: architecture and cybersecurity challenges., , , , , and . WAC, page 1-6. IEEE, (2021)Importance of Phase Information in Speech Enhancement., , and . CISIS, page 770-773. IEEE Computer Society, (2010)Bandwidth Scalable Wideband Codec Using Hybrid Matching Pursuit Harmonic/CELP Scheme., , , and . CISIS, page 620-626. IEEE Computer Society, (2009)Design and Implementation of a Ubiquitous ECG Monitoring System Using SIP and the Zigbee Network., , , and . FGCN (2), page 599-604. IEEE Computer Society, (2007)