Author of the publication

Trust Negotiation Based Approach to Enforce MANET Routing Security.

, , , , and . ARES, page 360-366. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain and trust-based clustering scheme for the IoV., , and . Ad Hoc Networks, (April 2023)Car2X Communication - Putting Security Negotiation into Practice., , , and . VTC Fall, page 1-5. IEEE, (2014)Blockchain-Based Trust Management Approach for IoV., , and . AINA (1), volume 225 of Lecture Notes in Networks and Systems, page 483-493. Springer, (2021)Investigation on the Integrated Cloud and BlockChain (ICBC)Technologies to Secure Healthcare Data Management Systems., , and . DeSE, page 19-26. IEEE, (2023)Deploying Security Policy in Intra and Inter Workflow Management Systems., , and . ARES, page 58-65. IEEE Computer Society, (2009)An Integrated Model for Access Control and Information Flow Requirements., , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 111-125. Springer, (2007)A Survey on Trust Management for WBAN: Investigations and Future Directions., , and . Sensors, 20 (21): 6041 (2020)Federated learning based IDS approach for the IoV., , and . ARES, page 123:1-123:6. ACM, (2022)Intra-Vehicular Network Security Datasets Evaluation., , and . SIMULTECH, page 401-408. SCITEPRESS, (2023)Deploying Access Control in Distributed Workflow., , and . AISC, volume 81 of CRPIT, page 9-17. Australian Computer Society, (2008)