Author of the publication

Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks.

, , , , , , and . IEEE Internet Things J., 9 (14): 12209-12218 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks., , , , , , and . CoRR, (2020)Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures., , , and . Internet Things, (April 2024)Towards Web Phishing Detection Limitations and Mitigation., , , , , , and . CoRR, (2022)One-to-Multiple Clean-Label Image Camouflage (OmClic) based Backdoor Attack on Deep Learning., , , , , , , , and . CoRR, (2023)Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT., , , , , and . IEEE Trans. Sustain. Comput., 8 (1): 32-42 (January 2023)Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN., , , , , , and . DSN, page 63-74. IEEE, (2021)Efficient Hash-Based Redactable Signature for Smart Grid Applications., , , , , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 554-573. Springer, (2022)Hybrid Cryptographic Access Control for Cloud-Based EHR Systems., , , , , , and . IEEE Cloud Comput., 3 (4): 58-64 (2016)Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments., , , , and . Inf. Process. Lett., (2022)Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT., , , , , and . IEEE Internet Things J., 8 (14): 11678-11689 (2021)