Author of the publication

PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks.

, , , , and . IEEE Trans. Veh. Technol., 58 (5): 2529-2543 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for SSVEP Recognition Based on Weighted Canonical Correlation Analysis., , , , , , , , , and 2 other author(s). SSCI, page 399-403. IEEE, (2019)A self-encryption authentication protocol with identity anonymity for teleconference services., , , and . GLOBECOM, page 5. IEEE, (2005)A Tree-Based Signature Scheme for VANETs., , , and . GLOBECOM, page 634-638. IEEE, (2008)Use of human gestures for controlling a mobile robot via adaptive CMAC network and fuzzy logic controller., , , , , , and . Neurocomputing, (2018)An efficient dynamic-identity based signature scheme for secure network coding., , , , and . Comput. Networks, 54 (1): 28-40 (2010)Diagnosis in Traditional Chinese Medicine Using Artificial Neural Networks: State-of-the-art and Perspectives., and . ICNC (2), page 290-294. IEEE Computer Society, (2007)An Approach to Syndrome Differentiation in Traditional Chinese Medicine based on Neural Network., and . ICNC (1), page 376-380. IEEE Computer Society, (2007)Diagnostic Rules Discovery with Hierarchical Clustering and Focusing Mechanism Based on Rough Sets Theory., and . FSKD (2), page 673-677. IEEE Computer Society, (2007)0-7695-2874-0.Efficient Re-Keying Scheme for Group Key Distribution., , , and . WCNC, page 2639-2644. IEEE, (2008)Opportunistic routing in tactical networks., and . ICC, page 328-333. IEEE, (2012)