Author of the publication

PPAS: privacy protection authentication scheme for VANET.

, , , and . Cluster Computing, 16 (4): 873-886 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Global Convergence of a Special Case of the DAI-Yuan Family without Line Search., and . APJOR, 25 (3): 411-420 (2008)An Analysis of Dynamic Game Strategy of Privacy Protection in Personalization., , and . WHICEB, page 4. Association for Information Systems, (2014)Duth: a user-friendly dual-factor authentication for Android smartphone devices., , , and . Security and Communication Networks, 8 (7): 1213-1222 (2015)Tumor Boundary Extraction in Multislice MR Brain Images Using Region and Contour Deformation., , , , , and . MIAR, page 183-187. IEEE Computer Society, (2001)Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks., , , and . IEEE Internet of Things Journal, 4 (1): 29-39 (2017)Theoretical study on the mechanism of the gas-phase reaction of diborane(3) anion with carbon disulfide., , , and . Journal of Computational Chemistry, 23 (3): 414-419 (2002)Information Diffusion Model Based on Privacy Setting in Online Social Networking Services., , and . Comput. J., 58 (4): 536-548 (2015)Efficient attribute based sequential aggregate signature for wireless sensor networks., , , , and . IJSNet, 16 (3): 172-184 (2014)Incremental feature weighting for fuzzy feature selection., , , , and . Fuzzy Sets and Systems, (2019)Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM., , , and . IEEE J. Biomedical and Health Informatics, 21 (3): 838-850 (2017)