Author of the publication

Energy-efficient node position identification through payoff matrix and variability analysis.

, , , , , , and . Telecommun. Syst., 65 (3): 459-477 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Schnorr-based implicit certification: improving the security and efficiency of V2X communications., , , and . IACR Cryptology ePrint Archive, (2019)Privacy-preserving linkage/revocation of VANET certificates without LAs., , , , , and . IACR Cryptology ePrint Archive, (2018)A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks., , , , , and . IACR Cryptology ePrint Archive, (2018)Revocation in Vehicular Public Key Infrastructures: Balancing privacy and efficiency., , , , and . Veh. Commun., (2021)A Taxonomy Model for Cloud Computing Services., , , , , , and . CLOSER, page 56-65. SciTePress, (2011)Designing and Assessing Multi-tenant Isolation Strategies for Cloud Networks., , and . ICIN, page 214-221. IEEE, (2019)A family of implementation-friendly BN elliptic curves., , , and . J. Syst. Softw., 84 (8): 1319-1326 (2011)Revisiting the Security of the ALRED Design and Two of Its Variants: Marvin and LetterSoup., and . IEEE Trans. Inf. Theory, 58 (9): 6223-6238 (2012)Faster isogeny-based compressed key agreement., , , , and . IACR Cryptol. ePrint Arch., (2017)Faster verification of V2X BSM messages via Message Chaining., , , , and . IACR Cryptol. ePrint Arch., (2022)