Author of the publication

PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications.

, , , and . IEEE Trans. Dependable Secur. Comput., 13 (1): 71-83 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architecture Support for Memory Confidentiality and Integrity in Embedded Systems., , , , and . Int. J. Distributed Sens. Networks, 5 (1): 96 (2009)Z-Channel: Scalable and efficient scheme in Zerocash., , , , and . Comput. Secur., (2019)Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing., , , and . IACR Cryptol. ePrint Arch., (2022)VCProof: Constructing Shorter and Faster-to-Verify zkSNARKs with Vector Oracles., , , and . IACR Cryptol. ePrint Arch., (2021)LedMAC: More Efficient Variants of LightMAC., , and . IACR Cryptol. ePrint Arch., (2021)Evaluation and Improvement of Generic-Emulating DPA Attacks., , , , , , , and . IACR Cryptol. ePrint Arch., (2016)Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (4): 27-56 (2021)Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128., , , , , , and . Comput. J., 61 (8): 1252-1258 (2018)Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256., , , , , and . Comput. J., 63 (12): 1859-1870 (2020)Identity-Based Encryption with Verifiable Outsourced Revocation., , , , and . Comput. J., 59 (11): 1659-1668 (2016)