Author of the publication

Privacy-Preserving Traffic Monitoring in Vehicular Ad Hoc Networks.

, , , , , and . AINA Workshops, page 22-24. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Traffic Monitoring in Vehicular Ad Hoc Networks., , , , , and . AINA Workshops, page 22-24. IEEE Computer Society, (2015)Regression rules extraction from artificial neural network based on least squares., , , and . ICNC, page 203-207. IEEE, (2011)Secure pay-TV for chained hotels., , , , and . Int. J. Inf. Sec., 17 (1): 33-42 (2018)Efficient group key management for secure big data in predictable large-scale networks., , , , and . Concurrency and Computation: Practice and Experience, 28 (4): 1174-1192 (2016)Towards cost-effective and low latency data center network architecture., , , , and . Computer Communications, (2016)Provably secure one-round identity-based authenticated asymmetric group key agreement protocol., , , and . Inf. Sci., 181 (19): 4318-4329 (2011)Fast Detection of Vehicles Based-on the Moving Region., , , and . CAD/Graphics, page 202-207. IEEE, (2007)Multiple Feature Vectors Based Fault Classification for WSN Integrated Bearing of Rolling Mill., , , and . J. Control. Sci. Eng., (2018)On Sketching Quadratic Forms., , , , , and . CoRR, (2015)On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures)., , , , and . CoRR, (2015)