Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deployment of Secure EV Charging System Using Open Charge Point Protocol., and . IWCMC, page 922-927. IEEE, (2018)Wireless Charging System for Connected and Autonomous Electric Vehicles., and . GLOBECOM Workshops, page 1-6. IEEE, (2018)Secure framework for multipath multimedia streaming over wireless ad hoc network., and . WCNC, page 2678-2683. IEEE, (2009)Evaluating Traffic Signs Detection using Faster R-CNN for Autonomous driving., , , and . CAMAD, page 1-6. IEEE, (2020)Guest editorial on vehicular communications and applications., , , , and . J. Netw. Comput. Appl., 36 (5): 1273-1274 (2013)Multimodal and Multi-pass Authentication Mechanisms for Electric Vehicle Charging Networks., and . IWCMC, page 371-376. IEEE, (2020)Authentication mechanism for mobile RFID based Smart grid network., , and . CCECE, page 1-6. IEEE, (2014)Security for Shared Electric and Automated Mobility Services in Smart Cities., and . IEEE Secur. Priv., 19 (1): 24-33 (2021)Investigating Authentication Mechanisms for Wireless Mobile Network., , , and . UIC, volume 4159 of Lecture Notes in Computer Science, page 902-911. Springer, (2006)Performance Analysis of Audio Streaming in Secure Wireless Access Network., , , , and . ACIS-ICIS, page 556-561. IEEE Computer Society, (2005)