Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Privacy for Mobile Healthcare Networks, and . Wireless Networks Springer, (2015)Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms., , , and . IACR Cryptology ePrint Archive, (2014)Cloud-based lightweight secure RFID mutual authentication protocol in IoT., , , and . Inf. Sci., (2020)A Decentralized Car-Sharing Control Scheme Based on Smart Contract in Internet-of-Vehicles., , , , and . VTC Spring, page 1-5. IEEE, (2020)Intelligent Cache Pollution Attacks Detection for Edge Computing Enabled Mobile Social Networks., , , and . IEEE Trans. Emerg. Top. Comput. Intell., 4 (3): 241-252 (2020)Exploiting Secure and Energy-Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks., , , , , and . IEEE Trans. Wirel. Commun., 15 (10): 6813-6827 (2016)A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems., , , , and . IEEE Netw., 33 (2): 44-49 (2019)CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service., , , , , and . IEEE Internet Things J., 1 (1): 46-57 (2014)Exploiting mobile social behaviors for Sybil detection., , , , and . INFOCOM, page 271-279. IEEE, (2015)PMQC: A privacy-preserving multi-quality charging scheme in V2G network., , and . GLOBECOM, page 675-680. IEEE, (2014)