Author of the publication

Comment on Ä Novel Homomorphic MAC Scheme for Authentication in Network Coding".

, , , , and . IEEE Communications Letters, 18 (12): 2129-2132 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications., and . IEEE Internet of Things Journal, 2 (3): 248-258 (2015)Threshold password authentication against guessing attacks in Ad hoc networks., , and . Ad Hoc Networks, 5 (7): 1046-1054 (2007)Privacy-Enhancing Aggregation Techniques for Smart Grid Communications. Wireless Networks Springer, (2016)Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks., , , , , and . IEEE Trans. Vehicular Technology, 61 (7): 3209-3222 (2012)An Efficient Message Authentication Scheme for Vehicular Communications., , , , and . IEEE Trans. Vehicular Technology, 57 (6): 3357-3368 (2008)An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications., , , and . IEEE Trans. Vehicular Technology, 59 (6): 2772-2785 (2010)Secure Localized Authentication and Billing for Wireless Mesh Networks., , , , and . GLOBECOM, page 486-491. IEEE, (2007)Design of Secret Reconstruction With Optimal Communication Efficiency., , , and . IEEE Communications Letters, 22 (8): 1556-1559 (2018)Achieve Location Privacy-Preserving Range Query in Vehicular Sensing., , , and . Sensors, 17 (8): 1829 (2017)Energy-Aware Encryption for Securing Video Transmission in Internet of Multimedia Things., , , and . IEEE Trans. Circuits Syst. Video Techn., 29 (3): 610-624 (2019)