Author of the publication

A Secure and Location Assurance Protocol for Location-Aware Services in VANETs.

, , and . IMIS, page 456-461. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An in-depth experimental study of anomaly detection using gradient boosted machine., and . Neural Comput. Appl., 31 (4): 955-965 (2019)Personalized Federated Learning for Statistical Heterogeneity., and . CoRR, (2024)Design of a Secure Digital Contents Delivery System in P2P Networks., , and . DRMTICS, volume 3919 of Lecture Notes in Computer Science, page 311-321. Springer, (2005)Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption., , , and . Communications and Multimedia Security, volume 6109 of Lecture Notes in Computer Science, page 214-232. Springer, (2010)A Fair and Reliable P2P E-Commerce Model Based on Collaboration with Distributed Peers., , , and . IWDC, volume 3741 of Lecture Notes in Computer Science, page 380-391. Springer, (2005)TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System., , and . IEEE Access, (2019)Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage., , , and . IEEE Access, (2018)Enhancing Accuracy Performance of Fuzzy Vault Non-Random Chaff Point Generator for Mobile Payment Authentication., , and . J. Multim. Inf. Syst., 3 (2): 13-20 (2016)A Data Provenance System for Myanmar Rice Cycle Based on Ethereum Blockchain., , and . J. Multim. Inf. Syst., 8 (1): 35-44 (2021)An Investigation of Pseudonymization Techniques in Decentralized Transactions., , , and . J. Internet Serv. Inf. Secur., 11 (4): 1-18 (2021)