Author of the publication

Enabling Secure Vehicle to Infrastructure Communication via Two-Factor Authentication.

, , and . ITSC, page 5663-5668. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Task Underspecification in Evaluating Deep Reinforcement Learning., , , , and . NeurIPS, (2022)RF-Enhanced Pavement Markings for Mobile Robot Lane Detection., , , , and . CASE, page 1-6. IEEE, (2023)AADL-based Modeling and TPN-based Verification of Reconfiguration in Integrated Modular Avionics., , and . APSEC, page 266-273. IEEE Computer Society, (2011)Model-free Learning of Corridor Clearance: A Near-term Deployment Perspective., , and . CoRR, (2023)Quantifying the Tradeoff Between Cybersecurity and Location Privacy., , and . CoRR, (2021)The Braess's Paradox in Dynamic Traffic., , , , , and . ITSC, page 1018-1023. IEEE, (2022)Enabling Secure Vehicle to Infrastructure Communication via Two-Factor Authentication., , and . ITSC, page 5663-5668. IEEE, (2023)RF-Enhanced Road Infrastructure for Intelligent Transportation., , , , , , , , , and . CoRR, (2023)Location-Based Schemes for Mitigating Cyber Threats on Connected and Automated Vehicles: A Survey and Design Framework., , , , and . IEEE Trans. Intell. Transp. Syst., 23 (4): 2919-2937 (2022)Proof of Travel for Trust-Based Data Validation in V2I Communication., , , and . IEEE Internet Things J., 10 (11): 9565-9584 (June 2023)