Author of the publication

A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers.

, , , , and . Wirel. Commun. Mob. Comput., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing., , , and . IEEE Internet of Things Journal, 4 (5): 1117-1124 (2017)An Efficient Blockchain-Based Bidirectional Friends Matching Scheme in Social Networks., , , , and . IEEE Access, (2020)A traceable threshold attribute-based signcryption for mHealthcare social network., , , , and . Int. J. Sens. Networks, 26 (1): 43-53 (2018)MBPSKA: Multi-Biometric and Physiological Signal-Based Key Agreement for Body Area Networks., , , and . IEEE Access, (2019)A Novel Certificateless Authentication and Key Agreement Protocol for Smart Grid., , , and . GLOBECOM, page 3288-3293. IEEE, (2023)An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids., , , , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 469-482. Springer, (2017)A Differential Private Mechanism to Protect Trajectory Privacy in Mobile Crowd-Sensing., , , and . WCNC, page 1-6. IEEE, (2019)An Enhanced Authentication and Key Agreement Protocol for Smart Grid Communication., , , , , and . IEEE Internet Things J., 11 (12): 22413-22428 (June 2024)Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid., , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 2145-2161 (July 2024)Generating Adversarial Examples With Shadow Model., , , , , and . IEEE Trans. Ind. Informatics, 18 (9): 6283-6289 (2022)