Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bit Flipping Key Encapsulation for the Post-Quantum Era., , , and . IEEE Access, (2023)Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism., , , , , , and . CoRR, (2022)SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification., , , , and . GLOBECOM, page 1-6. IEEE, (2018)PASPORT: A Secure and Private Location Proof Generation and Verification Framework., , , , and . IEEE Trans. Comput. Soc. Syst., 7 (2): 293-307 (2020)Towards quantum-secure software defined networks., , , , and . IET Quantum Commun., 5 (1): 66-71 (March 2024)Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 288-300 (2023)Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks., , , , , , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 3831-3847 (September 2023)RF Fingerprinting-Based IoT Node Authentication Using Mahalanobis Distance Correlation Theory., , , , , and . IEEE Netw. Lett., 4 (2): 78-81 (2022)Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks., , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Location Privacy Protection in Social Networks. University of Technology Sydney, Australia, (2020)