Author of the publication

Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs.

, , , , and . Secur. Commun. Networks, 9 (18): 5460-5471 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel privacy-preserving speech recognition framework using bidirectional LSTM., , , , and . J. Cloud Comput., (2020)HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT., , , and . IPCCC, page 1-7. IEEE, (2019)Fair Auction and Trade Framework for Cloud VM Allocation based on Blockchain., , , , and . CoRR, (2020)Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks., , and . J. Supercomput., 71 (11): 4015-4018 (2015)Utility-efficient Differentially Private K-means Clustering based on Cluster Merging., , , , and . CoRR, (2020)A novel anonymous secret sharing scheme based on BP Artificial Neural Network., , and . ICNC, page 366-370. IEEE, (2012)PATH: privacy-preserving auction for heterogeneous spectrum allocations., , , , and . Wireless Networks, 25 (4): 1763-1776 (2019)MobileEdge: Enhancing On-Board Vehicle Computing Units Using Mobile Edges for CAVs., , , , and . ICPADS, page 470-479. IEEE, (2019)Intrusion-resilient public cloud auditing scheme with authenticator update., , , and . Inf. Sci., (2020)RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers., , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 330-344. Springer, (2019)