Author of the publication

A Realistic Distributed Conditional Privacy- Preserving Authentication Scheme for Vehicular Ad Hoc Networks.

, , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructions of optimal low-hit-zone frequency hopping sequence sets., , , , and . Des. Codes Cryptogr., 85 (2): 219-232 (2017)Construction of low-hit-zone frequency hopping sequences with optimal partial Hamming correlation by interleaving techniques., , , , and . Des. Codes Cryptogr., 84 (3): 401-414 (2017)A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services., , , , and . Sensors, 23 (3): 1264 (February 2023)A Low-Calculation Contactless Continuous Authentication Based on Postural Transition., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Geographic-Based Service Request Scheduling Model for Mobile Cloud Computing., , , and . TrustCom, page 1446-1453. IEEE Computer Society, (2012)MTD Analysis and evaluation framework in Software Defined Network (MASON)., , , and . SDN-NFV@CODASPY, page 43-48. ACM, (2018)On the buffer-aided collaborative relaying scheme for asymmetric parallel relay networks., , , , , and . WCSP, page 1-5. IEEE, (2015)SMDP-Based Resource Allocation for Wireless Networks with Energy Harvesting Constraints., , , and . VTC Fall, page 1-6. IEEE, (2017)A SMDP Based Virtual Resource Allocation Model for Multimedia Services in 5G Network., , , and . VTC Fall, page 1-5. IEEE, (2016)Peer to Peer Anti-Money Laundering Resource Allocation Based on Semi-Markov Decision Process., , , , and . GLOBECOM, page 1-6. IEEE, (2015)