Author of the publication

Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures.

, , , , , , , and . Cryptogr., 8 (1): 5 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2., , , and . IEEE Trans. Vehicular Technology, 68 (12): 11577-11587 (2019)Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis., , , , , , , and . CoRR, (2023)A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications., , , , and . IEEE Trans. Veh. Technol., 70 (9): 9306-9319 (2021)Continuous authentication for VANET., , , , , and . Veh. Commun., (2020)ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 1799-1817 (May 2023)On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!, , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Trust management in vehicular ad hoc network: a systematic review., , , , , , and . EURASIP J. Wirel. Commun. Netw., (2015)Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata., , and . IEEE Open J. Comput. Soc., (2024)A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies., , , , , , , and . IEEE Access, (2024)Authentication strategies in vehicular communications: a taxonomy and framework., , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 129 (2021)