Author of the publication

Dynamic Distributed Certificate Authority Services for Mobile Ad Hoc Networks.

, , , and . WCNC, page 2625-2630. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forward-secure multisignature and blind signature schemes., , , and . Appl. Math. Comput., 168 (2): 895-908 (2005)Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed., , , , , , , , , and 11 other author(s). IEEE J. Sel. Areas Commun., 24 (10): 1889-1900 (2006)UFLE: a user-friendly location-free encryption system for mobile users., , , and . Secur. Commun. Networks, 7 (10): 1477-1487 (2014)A Secure Modified ID-Based Undeniable Signature Scheme., , , and . IACR Cryptol. ePrint Arch., (2003)Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design., , , , , , , , , and . Quantum Inf. Process., 13 (6): 1425-1435 (2014)MLAS: multiple level authentication scheme for VANETs., , , and . AsiaCCS, page 471-475. ACM, (2011)Providing distributed certificate authority service in cluster-based mobile ad hoc networks., , , , and . Comput. Commun., 30 (11-12): 2442-2452 (2007)A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities., , , , and . Pervasive Mob. Comput., (2017)PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid., , , , and . IEEE Trans. Dependable Secur. Comput., 12 (1): 85-97 (2015)Signcryption in Hierarchical Identity Based Cryptosystem., , , and . IACR Cryptology ePrint Archive, (2004)