Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey., , and . IEEE Commun. Surv. Tutorials, 19 (4): 3015-3045 (2017)DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids., and . IEEE Trans. Engineering Management, 67 (4): 1285-1297 (2020)Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems., , , , and . Sensors, 20 (4): 997 (2020)Cyber security for fog-based smart grid SCADA systems: Solutions and challenges., , and . J. Inf. Secur. Appl., (2020)Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges., , , , and . IEEE Access, (2020)A Novel Hierarchical Intrusion Detection System Based on Decision Tree and Rules-Based Models., , , , and . DCOSS, page 228-233. IEEE, (2019)SDPP: an intelligent secure detection scheme with strong privacy-preserving for mobile peer-to-peer social network., , and . Int. J. Inf. Comput. Secur., 6 (3): 241-269 (2014)ECPDR: An Efficient Conditional Privacy-Preservation Scheme with Demand Response for Secure Ad hoc Social Communications., , and . Int. J. Embed. Real Time Commun. Syst., 4 (3): 43-71 (2013)Security and Privacy in Fog Computing: Challenges., , , , , , and . IEEE Access, (2017)An efficient indexing for Internet of Things massive data based on cloud-fog computing., , , , , and . Trans. Emerg. Telecommun. Technol., (2020)