Author of the publication

Secure and revocable node authentication in Vehicular Ad-Hoc Networks.

, , and . ISCC, page 293-298. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed denial of service attack prediction: Challenges, open issues and opportunities., , and . Comput. Networks, (February 2023)LORENA: Low memORy symmEtric-Key geNerAtion Method for Based on Group Cryptography Protocol Applied to the Internet of Healthcare Things., , , , , and . IEEE Access, (2022)Autonomous architecture for managing firewalling Cloud-based service., , , and . NOF, page 1-5. IEEE, (2014)A Stochastic Adaptive Model to Explore Mobile Botnet Dynamics., , and . IEEE Communications Letters, 21 (4): 753-756 (2017)Delay Sensitivity-Aware Aggregation of Smart Microgrid Data Over Heterogeneous Networks., , , , , and . ICC, page 1-7. IEEE, (2019)A survey on federated learning for security and privacy in healthcare applications., , , , and . Comput. Commun., (July 2023)E-Health Sensitive Data Dissemination Exploiting Trust and Mobility of Users., , and . CoRR, (2020)Survivable key management on WANETs., , , and . IEEE Wirel. Commun., 18 (6): 82-88 (2011)Programmable Networks - From Software-Defined Radio to Software-Defined Networking., , , , and . IEEE Commun. Surv. Tutorials, 17 (2): 1102-1125 (2015)A Software-Defined Wireless Network-Based System for Prioritizing Medical Alert Messages., , , , and . SBESC, page 1-6. IEEE, (2023)