Author of the publication

A dynamic-encryption authentication scheme for M2M security in cyber-physical systems.

, and . GLOBECOM, page 2897-2901. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Vulnerabilities - From Data Analysis to Protection Mechanisms., , , and . WORDS Fall, page 331-338. IEEE Computer Society, (2003)Securing Multiparty Online Services Via Certification of Symbolic Transactions., , , and . IEEE Symposium on Security and Privacy, page 833-849. IEEE Computer Society, (2015)A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities., , , and . DSN, page 605-614. IEEE Computer Society, (2003)Brahmastra: Driving Apps to Test the Security of Third-Party Components., , , , , , , , and . USENIX Security Symposium, page 1021-1036. USENIX Association, (2014)Biprism-based monocular stereovision system parameter optimization., , , , and . J. Electronic Imaging, 27 (03): 033020 (2018)An Easily Fabricated Linear Piezoelectric Actuator Using Sandwich Longitudinal Vibrators With Four Driving Feet., , , , and . IEEE Access, (2019)An Adaptive Framework for Multi-Vehicle Ground Speed Estimation in Airborne Videos., , , , , and . Remote Sensing, 11 (10): 1241 (2019)Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks., , , and . IEEE Internet of Things Journal, 4 (1): 29-39 (2017)Track fusion in the presence of sensor biases., and . IET Signal Processing, 8 (9): 958-967 (2014)Kernel K-means Based Framework for Aggregate Outputs Classification., , , and . ICDM Workshops, page 356-361. IEEE Computer Society, (2009)