Author of the publication

An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs.

, , , and . Mob. Inf. Syst., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Pseudonym Ring Building Scheme for Anonymous Authentication in VANETs., and . BWCCA, volume 25 of Lecture Notes on Data Engineering and Communications Technologies, page 481-489. Springer, (2018)A hybrid approach to secure hierarchical mobile IPv6 networks., , and . Comput. Sci. Inf. Syst., 10 (2): 913-938 (2013)Access Authentication Schemes for PMIPV6: A Survey., , , and . IMIS, page 355-360. IEEE Computer Society, (2016)An Anonymous Authentication Scheme Based on Group IBS for PMIPv6 Network., , and . IMIS, volume 612 of Advances in Intelligent Systems and Computing, page 330-341. Springer, (2017)Indicator-Based Multi-objective Bacterial Foraging Algorithm with Adaptive Searching Mechanism., , , , , and . BIC-TA (2), volume 682 of Communications in Computer and Information Science, page 271-277. Springer, (2016)An anonymous authentication scheme for edge computing-based car-home connectivity services in vehicular networks., , and . Future Gener. Comput. Syst., (2020)Electronic Payment Schemes Based on Blockchain in VANETs., and . IEEE Access, (2020)FOG-Empowered Augmented-Intelligence-Based Proactive Defensive Mechanism for IoT-Enabled Smart Industries., , , and . IEEE Internet Things J., 10 (21): 18599-18608 (November 2023)Procedural Generation of Game Levels and Maps: A Review., , and . ICAIIC, page 50-55. IEEE, (2022)A Survey of Markov Model in Reinforcement Learning., , and . ICAIIC, page 284-287. IEEE, (2022)