Author of the publication

Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange.

, , , and . Int. J. Netw. Secur., 21 (5): 861-871 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wireless energy harvesting and information transfer in cognitive two-way relay networks., , , , and . GLOBECOM, page 3465-3470. IEEE, (2014)End-To-End Graph-based Deep Semi-Supervised Learning., , and . CoRR, (2020)Emora: An Inquisitive Social Chatbot Who Cares For You., , , , , , , , , and 1 other author(s). CoRR, (2020)Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange., , , and . Int. J. Netw. Secur., 21 (5): 861-871 (2019)A Unified Attribute-Based Encryption Data Sharing Scheme Matching Industrial Internet Framework., and . IEEE Internet Things J., 11 (5): 9153-9170 (2024)Meta Relational Learning-Based Service-Tailored VNF Deployment for B5G Network Slice., , , , , and . IEEE Internet Things J., 10 (24): 22542-22554 (December 2023)Modeling and bandwidth allocation of cognitive relay networks with energy harvesting nodes., , , and . ICCC, page 1-6. IEEE, (2016)Q&A participation and behavioral patterns on academic social networking sites: a comparative study of academic, corporate and government institutions on ResearchGate., , , and . Aslib J. Inf. Manag., 74 (3): 495-521 (2022)Machine Learning for Encrypted Malicious Traffic Detection: Approaches, Datasets and Comparative Study., , and . CoRR, (2022)Robust Permissioned Blockchain Consensus for Unstable Communication in FANET., , , , , , , , and . IEEE/ACM Trans. Netw., 32 (1): 699-712 (February 2024)