Author of the publication

ESAC: An Efficient and Secure Access Control Scheme in Vehicular Named Data Networking.

, , , , and . IEEE Trans. Veh. Technol., 69 (9): 10252-10263 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ESAC: An Efficient and Secure Access Control Scheme in Vehicular Named Data Networking., , , , and . IEEE Trans. Veh. Technol., 69 (9): 10252-10263 (2020)A Distributed Authentication Scheme Based on Smart Contract for Roaming Service in Mobile Vehicular Networks., , , , , and . IEEE Trans. Veh. Technol., 71 (5): 5284-5297 (2022)Privacy Preservation in Multi-Cloud Secure Data Fusion for Infectious-Disease Analysis., , , and . IEEE Trans. Mob. Comput., 22 (7): 4212-4222 (July 2023)Query Integrity Meets Blockchain: A Privacy-Preserving Verification Framework for Outsourced Encrypted Data., , , , , and . IEEE Trans. Serv. Comput., 16 (3): 2100-2113 (May 2023)An efficient data aggregation scheme with local differential privacy in smart grid., , , , , and . Digit. Commun. Networks, 8 (3): 333-342 (2022)MP-VR: An MPTCP-Based Adaptive Streaming Framework for 360-degree Virtual Reality Videos., , , , , and . ICC, page 1-6. IEEE, (2021)A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-Time., , and . GLOBECOM, page 1-6. IEEE, (2019)A Cloud-Based Secure and Privacy-Preserving Clustering Analysis of Infectious Disease., , , , and . PAC, page 107-116. IEEE, (2018)Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems., , , and . MILCOM, page 559-564. IEEE, (2018)Data and Spectrum Trading Policies in a Trusted Cognitive Dynamic Network., , , , and . CoRR, (2018)