Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UMTS user identity confidentiality: An end-to-end solution., , and . WOCN, page 1-6. IEEE, (2011)Privacy preserving integrity checking of shared dynamic cloud data with user revocation., and . J. Inf. Secur. Appl., (2020)Security Extension for Relaxed Trust Requirement in Non3GPP Access to the EPS., , and . Int. J. Netw. Secur., 18 (6): 1041-1053 (2016)Efficient scheme for dynamic Cloud data shared within a static group with privacy preserving auditing and traceability., and . CCIOT, page 25-32. ACM, (2018)Enhancing User Identity Privacy in LTE., , and . TrustCom, page 949-957. IEEE Computer Society, (2012)An Efficient TDMA MAC Protocol for Multi-hop WiFi-Based Long Distance Networks., , , and . Wirel. Pers. Commun., 86 (4): 1971-1994 (2016)A Security Extension Providing User Anonymity and Relaxed Trust Requirement in Non-3GPP Access to the EPS., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 226-244. Springer, (2014)A tightly synchronized TDMA MAC protocol for multi-hop WiFi-based long distance networks., , , and . ICUFN, page 543-548. IEEE, (2014)A secure Device-to-Device communication scheme for massive Machine Type Communication., , and . Comput. Secur., (2021)Enhanced identity privacy in UMTS., , and . Int. J. Ad Hoc Ubiquitous Comput., 28 (4): 203-219 (2018)