Author of the publication

Secure Bluetooth Piconet Using Non-anonymous Group Key.

, , , and . EurAsia-ICT, volume 2510 of Lecture Notes in Computer Science, page 766-777. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Group Delegated ID-Based Proxy Re-encryption for PHR., , and . IMIS, volume 1195 of Advances in Intelligent Systems and Computing, page 447-456. Springer, (2020)Secure Data Deduplication Scheme Using Linkage of Data Blocks in Cloud Storage Environment., and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 539-545. Springer, (2018)Intelligent Home Network Authentication: Home Device Authentication Using Device Certification., , , , and . OTM Conferences (2), volume 4804 of Lecture Notes in Computer Science, page 1688-1700. Springer, (2007)An Anonymous Protocol for Member Privacy in a Consortium Blockchain., , , and . SpaCCS, volume 11611 of Lecture Notes in Computer Science, page 456-464. Springer, (2019)Interprocedural Transformations for Extracting Maximum Parallelism., , , and . ADVIS, volume 2457 of Lecture Notes in Computer Science, page 415-424. Springer, (2002)A Digital Nominative Proxy Signature Scheme for Mobile Communication., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 451-455. Springer, (2001)A Federated Framework for Fine-Grained Cloud Access Control for Intelligent Big Data Analytic by Service Providers., , , and . IEEE Access, (2021)Efficient Short Group Signatures for Conditional Privacy in Vehicular Ad Hoc Networks via ID Caching and Timed Revocation., and . IEEE Access, (2021)Pairing-Free Signatures With Insider-Attack Resistance for Vehicular Ad-Hoc Networks (VANETs)., , and . IEEE Access, (2021)Secure and Efficient Storage of Video Data in a CCTV Environment., and . KSII Trans. Internet Inf. Syst., 13 (6): 3238-3257 (2019)