Author of the publication

A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs.

, , , , and . J. Univers. Comput. Sci., 19 (16): 2385-2403 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient multiplier based on hybrid approach for Toeplitz matrix-vector product., , , and . Inf. Process. Lett., (2018)Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services., , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 437-443. Springer, (2015)Spyware Resistant Smartphone User Authentication Scheme., , and . IJDSN, (2014)Multipath routing technique for responding to sniffing attacks in wireless multimedia sensor network environment., , , and . Int. J. Sens. Networks, 24 (3): 200-207 (2017)Automatic Vehicle License Plate Recognition Using Optimal K-Means With Convolutional Neural Network for Intelligent Transportation Systems., , , , , , , and . IEEE Access, (2020)Cyber threats to mobile messenger apps from identity cloning., , and . Intell. Autom. Soft Comput., 22 (3): 379-387 (2016)Resource Provisioning for Cyber-Physical-Social System in Cloud-Fog-Edge Computing Using Optimal Flower Pollination Algorithm., , , , , , and . IEEE Access, (2020)Evaluating Differentially Private Generative Adversarial Networks Over Membership Inference Attack., , , , and . IEEE Access, (2021)DRM Cloud Architecture and Service Scenario for Content Protection., , and . J. Internet Serv. Inf. Secur., 3 (3/4): 94-105 (2013)Explicit formulae for Mastrovito matrix and its corresponding Toeplitz matrix for all irreducible pentanomials using shifted polynomial basis., , , and . Integr., (2016)