Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptography in WSNs., , and . Mission-Oriented Sensor Networks and Systems (1), 163, Springer, (2019)ACPC: Efficient revocation of pseudonym certificates using activation codes., , , , and . IACR Cryptology ePrint Archive, (2018)Schnorr-Based Implicit Certification: Improving the Security and Efficiency of Vehicular Communications., , , and . IEEE Trans. Computers, 70 (3): 393-399 (2021)A Differentially Private Hybrid Approach to Traffic Monitoring., , , and . ACNS (2), volume 12727 of Lecture Notes in Computer Science, page 233-256. Springer, (2021)Wearables Security and Privacy., , , and . Mission-Oriented Sensor Networks and Systems (2), 164, Springer, (2019)qSCMS: Post-quantum certificate provisioning process for V2X., , , and . IACR Cryptology ePrint Archive, (2018)ACPC: Efficient revocation of pseudonym certificates using activation codes., , , , and . Ad Hoc Networks, (2019)Privacy-Preserving Certificate Linkage/Revocation in VANETs Without Linkage Authorities., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (6): 3326-3336 (2021)The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications., , , , and . VNC, page 1-8. IEEE, (2018)Privacy-preserving linkage/revocation of VANET certificates without LAs., , , , , and . IACR Cryptology ePrint Archive, (2018)