Author of the publication

Secure vehicular communication systems: implementation, performance, and research challenges.

, , , , , , , , , , and . IEEE Communications Magazine, 46 (11): 110-118 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keep Calm and Carry on with Cybersecurity @Home: A Framework for Securing Homeworking IT Environment., , , and . Int. J. Cyber Situational Aware., 5 (1): 1-25 (2020)AssemblyNet: A large ensemble of CNNs for 3D whole brain MRI segmentation., , , , , , , and . NeuroImage, (2020)Robust Shape Regularity Criteria for Superpixel Evaluation., , and . CoRR, (2019)Evaluation Framework of Superpixel Methods with a Global Regularity Measure., , and . CoRR, (2019)Towards broader generalization of deep learning methods for multiple sclerosis lesion segmentation., , , , , and . CoRR, (2020)AssemblyNet: A large ensemble of CNNs for 3D Whole Brain MRI Segmentation., , , , , , , and . CoRR, (2019)Exemplar-based Assignment of Large Missing Audio Parts using String Matching on Tonal Features., , , , and . ISMIR, page 507-512. University of Miami, (2011)Equations aux différences partielles définies sur des graphes pour le traitement d'images et de données. (Partial difference equations over graphs for image and data processing).. University of Caen Normandy, France, (2009)On formal and automatic security verification of WSN transport protocols., and . IACR Cryptol. ePrint Arch., (2013)SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains., , and . ICC, page 2073-2078. IEEE, (2013)