Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient privacy-preserving protocol for database-driven cognitive radio networks., , , and . Ad Hoc Networks, (2019)Lightweight privacy preservation for secondary users in cognitive radio networks., , , , and . J. Netw. Comput. Appl., (2020)Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification., , , and . Secur. Commun. Networks, (2019)A lightweight authentication scheme for vehicular ad hoc networks based on MSR., , , , , , , and . Veh. Commun., (2019)Intelligent Traffic Light Model Based on Grey-Markov Model and Improved Ant Colony Optimization for Dynamic Route Guidance., , and . CSCloud, page 204-212. IEEE Computer Society, (2015)A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks., , , and . Trustcom/BigDataSE/ISPA, page 138-143. IEEE, (2016)Fault-Tolerant Algorithms for Connectivity Restoration in Wireless Sensor Networks., , and . Sensors, 16 (1): 3 (2016)Random Access Control for M2M in LTE System., and . IJDSN, (2013)A new privacy-preserving authentication protocol for anonymous web browsing., , , , , , , and . Concurr. Comput. Pract. Exp., (2019)An Efficient Location Privacy-Preserving Authentication Scheme for Cooperative Spectrum Sensing., , and . IEEE Access, (2020)