Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust management in vehicular ad hoc network: a systematic review., , , , , , and . EURASIP J. Wirel. Commun. Netw., (2015)Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2., , , and . IEEE Trans. Vehicular Technology, 68 (12): 11577-11587 (2019)A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications., , , , and . IEEE Trans. Veh. Technol., 70 (9): 9306-9319 (2021)Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis., , , , , , , and . CoRR, (2023)Continuous authentication for VANET., , , , , and . Veh. Commun., (2020)On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!, , , , and . IEEE Trans. Inf. Forensics Secur., (2021)ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 1799-1817 (May 2023)A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies., , , , , , , and . IEEE Access, (2024)Authentication strategies in vehicular communications: a taxonomy and framework., , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 129 (2021)The Model of Customer Trust for Internet Banking Adoption., , , and . Computational Intelligence and Efficiency in Engineering Systems, volume 595 of Studies in Computational Intelligence, Springer, (2015)