Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey., , and . IEEE Commun. Surv. Tutorials, 19 (4): 3015-3045 (2017)ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network., and . Telecommun. Syst., 66 (3): 481-503 (2017)FBMP-IDS: FL-Based Blockchain-Powered Lightweight MPC-Secured IDS for 6G Networks., , , , , and . IEEE Access, (2024)Lightweight Authentication Protocols for Internet of Vehicles: Network Model, Taxonomy and Challenges., , , and . PAIS, page 1-6. IEEE, (2022)Intrusion Detection using Data Mining: A contemporary comparative study., , and . PAIS, page 1-8. IEEE, (2018)Privacy-preserving schemes for Ad Hoc Social Networks: A survey., , and . CoRR, (2016)ESIKE: An Efficient and Secure Internet Key Exchange Protocol., , , , and . Wirel. Pers. Commun., 128 (2): 1309-1324 (2023)A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models., , , , and . CoRR, (2018)RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks., , , , and . Future Internet, 12 (3): 44 (2020)An Enhanced of Secure Authentication Scheme for the Internet of Things., , , and . PAIS, page 1-6. IEEE, (2022)