Author of the publication

Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization.

, , , , and . IEEE Internet Things J., 9 (9): 7009-7024 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Protect Personal Information against Keyloggers., , and . IMSA, page 275-280. IASTED/ACTA Press, (2005)Embedding Digital Signatures in MP3s., , and . IMSA, page 271-274. IASTED/ACTA Press, (2005)Approximating the Vertex Cover Problem by Selection of Nodes of Maximum Degrees for use in Wireless Sensor Networks.. FCS, page 256-259. CSREA Press, (2008)An Intrusion Detection System for Mobile Ad-Hoc Networks.. Security and Management, page 285-290. CSREA Press, (2009)Near-linear wirelength estimation for FPGA placement., , , , and . CCECE, page 1198-1203. IEEE, (2009)An Approximate Solution for Steiner Trees in Multicast Routing., , and . IC-AI, page 707-711. CSREA Press, (2004)BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain., , , , and . IACR Cryptol. ePrint Arch., (2020)Applying Variable Coe_cient functions to Self-Organizing Feature Maps for Network Intrusion Detection on the 1999 KDD Cup Dataset., and . CSER, volume 8 of Procedia Computer Science, page 333-337. Elsevier, (2012)An improved differential privacy algorithm to protect re-identification of data., , and . IHTC, page 133-138. IEEE, (2017)A Parallel Algorithm For Determining The Inverse Of A Matrix For Use In Block Cipher Encryption And Decryption.. CSC, page 164-172. CSREA Press, (2005)