Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conditional privacy preserving security protocol for NFC applications., , , , and . ICCE, page 380-381. IEEE, (2012)Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection., , , , , and . Sensors, 17 (6): 1360 (2017)Bandwidth-aware breach-free barrier construction with VANET nodes for realtime fugitive search., , , , , and . MILCOM, page 1021-1026. IEEE, (2015)PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability., , , , , , and . Wirel. Commun. Mob. Comput., (2017)Leveraging Smart Contracts for Asynchronous Group Key Agreement in Internet of Things., , , , , and . SMC, page 70-75. IEEE, (2020)Towards Achieving Anonymity in LBS: A Cloud Based Untrusted Middleware., , , , and . CloudCom (2), page 262-265. IEEE Computer Society, (2013)978-0-7695-5095-4.A Federated Approach for Fine-Grained Classification of Fashion Apparel., , , , , and . CoRR, (2020)PB-MII: replacing static RSUs with public buses-based mobile intermediary infrastructure in urban VANET-based clouds., , , , , and . Clust. Comput., 20 (3): 2231-2252 (2017)Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds., , , , , , and . IEEE Internet Things J., 5 (4): 2441-2448 (2018)Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis*., , , , , and . ICNC, page 159-163. IEEE, (2019)