Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs., , , and . ICC, page 7298-7303. IEEE, (2015)Privacy-Preserving mHealth Data Release with Pattern Consistency., , , and . GLOBECOM, page 1-6. IEEE, (2016)Secure and Efficient AKA Scheme and Uniform Handover Protocol for 5G Network Using Blockchain., , , , and . IEEE Open J. Commun. Soc., (2021)EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks., , , and . IEEE Access, (2019)Efficient Search Over Encrypted Medical Data With Known-Plaintext/Background Models and Unlinkability., , , , , , and . IEEE Access, (2021)Secure Data Obfuscation Scheme to Enable Privacy-Preserving State Estimation in Smart Grid AMI Networks., , , , and . IEEE Internet Things J., 3 (5): 709-719 (2016)Investigating Public-Key Certificate Revocation in Smart Grid., , , and . IEEE Internet Things J., 2 (6): 490-503 (2015)A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks., and . IEEE Trans. Parallel Distributed Syst., 23 (10): 1805-1818 (2012)Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings., , , , and . IEEE Syst. J., 15 (3): 4189-4198 (2021)Detecting Sybil Attacks Using Proofs of Work and Location in VANETs., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (1): 39-53 (2022)