Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks., , , , , , and . Concurr. Comput. Pract. Exp., (2018)Corrigendum to "Private key agreement and secure communication for heterogeneous sensor networks" J. Parallel Distrib. Comput 70 (2010) 858-870., and . J. Parallel Distributed Comput., 70 (11): 1174 (2010)Secure timing synchronization for heterogeneous sensor network using pairing over elliptic curve., , and . Wirel. Commun. Mob. Comput., 10 (5): 662-671 (2010)Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks., , , , and . IEEE Trans. Ind. Informatics, 14 (2): 799-813 (2018)From sensing to alerting: a pathway of RESTstful messaging in ambient assisted living., , , , , and . IEEE Wirel. Commun., 23 (2): 102-110 (2016)Pairing-Based Secure Timing Synchronization for Heterogeneous Sensor Networks., , and . GLOBECOM, page 148-152. IEEE, (2008)Privacy preserving secure data exchange in mobile P2P cloud healthcare environment., , , , , and . Peer-to-Peer Netw. Appl., 9 (5): 894-909 (2016)Identity and Pairing-Based Secure Key Management Scheme for Heterogeneous Sensor Networks., , and . WiMob, page 423-428. IEEE Computer Society, (2008)Private Communication and Authentication Protocol for Wireless Sensor Networks., , and . NTMS, page 1-6. IEEE, (2008)Security, Privacy, and Applications in Mobile Healthcare., , , , and . IJDSN, (2015)