Author of the publication

Anonymous Communication via Anonymous Identity-Based Encryption and Its Application in IoT.

, , , , , and . Wirel. Commun. Mob. Comput., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach., , , and . Ad Hoc Networks, (2016)An accurate performance model of shared buffer ATM switches under hot spot traffic., and . Comput. Commun., 22 (6): 516-522 (1999)ItswTCM: a new aggregate marker to improve fairness in DiffServ., and . Comput. Commun., 26 (9): 1018-1027 (2003)A Cost Analysis Framework for NEMO Prefix Delegation-Based Schemes., , and . IEEE Trans. Mob. Comput., 11 (7): 1192-1206 (2012)Multi-objective optimisation for selective packet discarding in wireless sensor network., , and . IET Wirel. Sens. Syst., 5 (3): 124-136 (2015)Special issue on new advanced techniques in security of artificial intelligence., , and . J. Ambient Intell. Humaniz. Comput., 13 (3): 1255-1257 (2022)Softwarization of UAV Networks: A Survey of Applications and Future Trends., , , and . IEEE Access, (2020)Data Collection for Security Measurement in Wireless Sensor Networks: A Survey., , , and . IEEE Internet Things J., 6 (2): 2205-2224 (2019)A Covert Jamming Scheme Against an Intelligent Eavesdropper in Cooperative Cognitive Radio Networks., , , , , , , , and . IEEE Trans. Veh. Technol., 72 (10): 13243-13254 (October 2023)Evaluation of the Route Optimization for NEMO in Satellite Networks., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (2): 46-66 (2011)