Author of the publication

Bandwidth-aware breach-free barrier construction with VANET nodes for realtime fugitive search.

, , , , , and . MILCOM, page 1021-1026. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conditional privacy preserving security protocol for NFC applications., , , , and . ICCE, page 380-381. IEEE, (2012)Bandwidth-aware breach-free barrier construction with VANET nodes for realtime fugitive search., , , , , and . MILCOM, page 1021-1026. IEEE, (2015)Leveraging Smart Contracts for Asynchronous Group Key Agreement in Internet of Things., , , , , and . SMC, page 70-75. IEEE, (2020)Towards Achieving Anonymity in LBS: A Cloud Based Untrusted Middleware., , , , and . CloudCom (2), page 262-265. IEEE Computer Society, (2013)978-0-7695-5095-4.Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection., , , , , and . Sensors, 17 (6): 1360 (2017)PB-MII: replacing static RSUs with public buses-based mobile intermediary infrastructure in urban VANET-based clouds., , , , , and . Clust. Comput., 20 (3): 2231-2252 (2017)Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds., , , , , , and . IEEE Internet Things J., 5 (4): 2441-2448 (2018)A Novel Resource Allocation scheme for NOMA-V2X-Femtocell with Channel Aggregation., , , , , and . GLOBECOM, page 1-6. IEEE, (2020)Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis*., , , , , and . ICNC, page 159-163. IEEE, (2019)Privacy aware incentive mechanism to collect mobile data while preventing duplication., , , , , and . MILCOM, page 1242-1247. IEEE, (2015)