Author of the publication

Efficient deniable authentication and its application in location-based services.

, , , , and . Comput. Electr. Eng., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.


Other publications of authors with the same name

An Integration of blockchain and AI for secure data sharing and detection of CT images for the hospitals., , , , , , and . Comput. Medical Imaging Graph., (2021)Event-Based Distributed Fixed-Time Resilient Control for Heterogeneous Vehicular Platoon Against Attack and Disturbances., , , and . IEEE Internet Things J., 10 (13): 11858-11868 (July 2023)Efficient Offline/Online Heterogeneous-Aggregated Signcryption Protocol for Edge Computing-Based Internet of Vehicles., , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (12): 14506-14519 (December 2023)Adaptive Resilient Control for Interconnected Vehicular Platoon With Fault and Saturation., , , and . IEEE Trans. Intell. Transp. Syst., 23 (8): 10210-10222 (2022)Distributed Finite-Time Fault-Tolerant Control for Heterogeneous Vehicular Platoon With Saturation., , , , and . IEEE Trans. Intell. Transp. Syst., 23 (11): 21259-21273 (2022)Distributed Adaptive Platoon Secure Control on Unmanned Vehicles System for Lane Change Under Compound Attacks., , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (11): 12637-12647 (November 2023)Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges., , , , and . Complex., (2020)ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications., , , and . J. Syst. Archit., (2022)Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding., , , , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 181-196. Springer, (2021)An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs., and . Veh. Commun., (2020)