Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Analysis of Incorrect Account Remediation in the Case of Broken Authentication., , , and . IEEE Access, (2023)A Novel Frequency Offset Estimation Algorithm Using Differential Combining for OFDM-Based WLAN Systems., , , , and . International Conference on Computational Science (4), volume 4490 of Lecture Notes in Computer Science, page 360-367. Springer, (2007)A Study of Performance Improvement in EAP., and . Networking, volume 4479 of Lecture Notes in Computer Science, page 1183-1186. Springer, (2007)A practical security framework for a VANET-based entertainment service., , and . PM2HW2N@MSWiM, page 175-182. ACM, (2009)A Behavioral Model of Web Traffic., and . ICNP, page 327-334. IEEE Computer Society, (1999)PPNDN: Popularity-based Caching for Privacy Preserving in Named Data Networking., and . ICIS, page 39-44. IEEE Computer Society, (2018)Extraction of TLS master secret key in windows., and . ICTC, page 667-671. IEEE, (2016)An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications., , and . VTC Fall, page 1-6. IEEE, (2010)Efficient Protocol for Searchable encryption and secure deletion on cloud storages., and . ICCE, page 444-447. IEEE, (2017)An efficient and versatile key management protocol for secure smart grid communications., and . WCNC, page 1823-1828. IEEE, (2012)