Author of the publication

No one can track you: Randomized authentication in Vehicular Ad-hoc Networks.

, , , and . PerCom, page 197-206. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MELT: Mapreduce-based Efficient Large-scale Trajectory Anonymization., , and . SSDBM, page 35:1-35:6. ACM, (2017)MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs., , , , , and . IEEE Trans. Mob. Comput., 16 (5): 1357-1370 (2017)High-Assurance Integrity Techniques for Databases., , , and . BNCOD, volume 5071 of Lecture Notes in Computer Science, page 244-256. Springer, (2008)Dynamics of fitness sharing evolutionary algorithms for coevolution of multiple species., , and . Appl. Soft Comput., 10 (3): 832-848 (2010)Location Privacy Policy Management System., , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 427-434. Springer, (2012)Faster FAST: multicore acceleration of streaming financial data., , , , , , and . Comput. Sci. Res. Dev., 23 (3-4): 249-257 (2009)A fast steady-state ε-dominance multi-objective evolutionary algorithm., , and . Comput. Optim. Appl., 48 (1): 109-138 (2011)IFIM: a database of integrated fitness information for microbial genes., , , , , and . Database J. Biol. Databases Curation, (2014)A Security Enhanced AODV Routing Protocol., , , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 298-307. Springer, (2005)Financial Crimes in Web3-Empowered Metaverse: Taxonomy, Countermeasures, and Opportunities., , , , , and . IEEE Open J. Comput. Soc., (2023)