Author of the publication

Reliable Cooperative Authentication for Vehicular Networks.

, , and . IEEE Trans. Intell. Transp. Syst., 19 (4): 1065-1079 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Digits Hidden in the Virtual World: Approximate Estimation Applying Capture and Recapture., and . WISA, volume 10763 of Lecture Notes in Computer Science, page 310-322. Springer, (2017)Simple Global Path Planning Algorithm Using a Ray-Casting and Tracking Method., , and . Journal of Intelligent and Robotic Systems, 90 (1-2): 101-111 (2018)Security Architecture for a Secure Database on Android., , , and . IEEE Access, (2018)UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program., , , , and . Softw. Pract. Exp., 48 (12): 2331-2349 (2018)Two-stage tamper response in tamper-resistant software., , , , and . IET Softw., 10 (3): 81-88 (2016)Efficient and Privacy-Preserving Metering Protocols for Smart Grid Systems., , and . IEEE Trans. Smart Grid, 7 (3): 1732-1742 (2016)SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform., , and . Multimedia Tools Appl., 76 (17): 18153-18173 (2017)Automatic Speech Recognition: Reliability and Pedagogical Implications for Teaching Pronunciation.. J. Educ. Technol. Soc., 9 (1): 322-334 (2006)Stability Control for Dynamic Walking of Bipedal Robot with Real-time Capture Point Trajectory Optimization., , and . Journal of Intelligent and Robotic Systems, 96 (3-4): 345-361 (2019)A Practical Security Architecture for In-Vehicle CAN-FD., , , and . IEEE Trans. Intell. Transp. Syst., 17 (8): 2248-2261 (2016)