Author of the publication

Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks.

, , , and . ICC, page 1-6. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building robust models for small data containing nominal inputs and continuous outputs based on possibility distributions., , and . Int. J. Machine Learning & Cybernetics, 10 (10): 2805-2822 (2019)Accurate van der Waals force field for gas adsorption in porous materials., , , , , and . J. Comput. Chem., 38 (23): 1991-1999 (2017)Fair exchange of valuable information: A generalised framework., , and . J. Comput. Syst. Sci., 77 (2): 348-371 (2011)The centralized formulation for complete dynamic modelling of robots., , and . J. Field Robotics, 17 (2): 119-126 (2000)A unified approach to a fair document exchange system., , and . J. Syst. Softw., 72 (1): 83-96 (2004)Towards Trusted and Accountable Win-Win SDWN Platform for Trading Wi-Fi Network Access., , , , and . CCNC, page 1-6. IEEE, (2023)A Selective Regression Testing Approach for Composite Web Services., , and . DeSE, page 97-101. IEEE, (2015)Toward secure trading of unlicensed spectrum in cyber-physical systems., , and . CCNC, page 1-4. IEEE, (2019)Revocable, Decentralized Multi-Authority Access Control System., , , and . UCC Companion, page 220-225. IEEE, (2018)LEMON: Language-Based Environment Manipulation via Execution-Guided Pre-training., , , , , and . EMNLP (Findings), page 471-485. Association for Computational Linguistics, (2022)