Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic Analysis: Resistance to Traffic Analysis Attacks in Tor System for Critical Infrastructures., , and . SMC, page 2832-2837. IEEE, (2018)Authentication Protocol for an IoT-Enabled LTE Network., , and . ACM Trans. Internet Techn., 16 (4): 25:1-25:20 (2016)SecureSMS: A secure SMS protocol for VAS and other applications., and . J. Syst. Softw., (2014)BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (3): 550-565 (2020)CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid., , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2011-2024 (May 2023)POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems., , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 700-704. Springer, (2023)Wheels on the Modbus - Attacking ModbusTCP Communications., , and . WISEC, page 288-289. ACM, (2022)PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs., , , , and . Computer, 53 (7): 29-44 (2020)An Efficient Batch Verification Protocol for Value Added Services., and . SMC, page 1560-1565. IEEE, (2013)Secure-AKA: An Efficient AKA Protocol for UMTS Networks., and . Wireless Personal Communications, 78 (2): 1345-1373 (2014)