Author of the publication

A Novel Location Privacy Mining Threat in Vehicular Internet Access Service.

, , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 467-476. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier., , , , and . Secur. Commun. Networks, (2019)A Novel Location Privacy Mining Threat in Vehicular Internet Access Service., , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 467-476. Springer, (2015)ECHO: Efficient Certificate Updating Scheme by Vehicle-to-Vehicle Communications., , and . FCST, page 581-586. IEEE Computer Society, (2009)An Event Grouping Approach for Infinite Stream with Differential Privacy., , , and . APSCC, volume 10065 of Lecture Notes in Computer Science, page 106-116. (2016)Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET., , , , and . IEEE Access, (2018)A performance study of CSMA in wireless networks with successive interference cancellation., , , , , , and . ICC, page 466-471. IEEE, (2012)Mix-zones Deployment for Location Privacy Preservation in Vehicular Communications., , , and . CIT, page 2825-2830. IEEE Computer Society, (2010)A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor Networks., , , , and . CIT, page 2837-2842. IEEE Computer Society, (2010)An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications., , , , and . IEEE Trans. Veh. Technol., 59 (7): 3589-3603 (2010)An efficient distributed key management scheme for group-signature based anonymous authentication in VANET., , , and . Secur. Commun. Networks, 5 (1): 79-86 (2012)