Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimized in-network authentication against pollution attacks in software-defined-named data networking., , , and . J. Inf. Secur. Appl., (2020)Privacy preservation for social networks sequential publishing., , and . Comput. Networks, (2020)Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions., , , , , and . IEEE Internet Things J., 6 (3): 4556-4560 (2019)H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming., , and . Comput. Secur., 24 (1): 57-68 (2005)Using ABE for Medical Data Protection in Fog Computing., , , and . ICEIS (2), page 155-161. SciTePress, (2019)Implementing a secure remote patient monitoring system., , , , and . Inf. Secur. J. A Glob. Perspect., 32 (1): 21-38 (January 2023)Service Orchestration in Autonomous Vehicle Networks: Leveraging Vehicular Fog and Edge Computing., , and . SoftCOM, page 1-6. IEEE, (2023)PReDIHERO - Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring., , , and . AICCSA, page 1-8. IEEE, (2021)Cryptanalysis and Improvement of Identity-Based Multisignature Scheme., , , and . ICFNDS, page 19:1-19:5. ACM, (2019)An Improved Key Graph based Key Management Scheme for Smart Grid AMI systems., , and . WCNC, page 1-6. IEEE, (2019)