Author of the publication

A heterogeneous online/offline signcryption scheme for Internet of Vehicles.

, , , , and . Veh. Commun., (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certificateless aggregate deniable authentication protocol for ad hoc networks., and . Int. J. Electron. Secur. Digit. Forensics, 10 (2): 168-187 (2018)Efficient and Short Identity-Based Deniable Authenticated Encryption., and . ICCCS (2), volume 10603 of Lecture Notes in Computer Science, page 244-255. Springer, (2017)ID-Based Deniable Threshold Ring Authentication., , , and . HPCC/CSS/ICESS, page 1779-1784. IEEE, (2015)Study on an Advanced Treatment of Domestic Wastewater by Bio-filtration and Water-Quality Measurement System., , , and . ICNC (3), page 644-648. IEEE Computer Society, (2009)Estimating Nitrogen Status of Plant by Vis/NIR Spectroscopy and Mathematical Model., , , , and . ICNC (3), page 612-616. IEEE Computer Society, (2009)Heterogeneous Deniable Authenticated Encryption Protocol., , , , and . FCS, volume 1286 of Communications in Computer and Information Science, page 331-346. Springer, (2020)EBIAC: Efficient biometric identity-based access control for wireless body area networks., , , , , and . J. Syst. Archit., (2021)The pricing model construction of reverse supply chain based on game theory., and . EMEIT, page 1880-1883. IEEE, (2011)Research on Optimization of Public Opinion Supervision Model of Social Network Platform Based on Evolutionary Game., , and . Inf., 14 (3): 151 (2023)Two-Level Attention with Multi-task Learning for Facial Emotion Estimation., , , , , and . MMM (1), volume 11295 of Lecture Notes in Computer Science, page 227-238. Springer, (2019)