Author of the publication

A secure anonymous routing protocol with authenticated key exchange for ad hoc networks.

, , , and . Computer Standards & Interfaces, 29 (5): 521-527 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication., and . I. J. Network Security, 3 (1): 35-38 (2006)Provably secure robust threshold partial blind signature., , and . Science in China Series F: Information Sciences, 49 (5): 604-615 (2006)Threshold password authentication against guessing attacks in Ad hoc networks., , and . Ad Hoc Networks, 5 (7): 1046-1054 (2007)A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications., and . IEEE Internet of Things Journal, 2 (3): 248-258 (2015)A secure anonymous routing protocol with authenticated key exchange for ad hoc networks., , , and . Computer Standards & Interfaces, 29 (5): 521-527 (2007)A regular expression matching engine with hybrid memories., and . Computer Standards & Interfaces, 36 (5): 880-888 (2014)RCare: Extending Secure Health Care to Rural Area Using VANETs., , , and . MONET, 19 (3): 318-330 (2014)Fully Anonymous Profile Matching in Mobile Social Networks., , , , , and . IEEE Journal on Selected Areas in Communications, 31 (9-Supplement): 641-655 (2013)Fine-grained data sharing in cloud computing for mobile devices., , and . INFOCOM, page 2677-2685. IEEE, (2015)An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs., , , , , and . INFOCOM, page 605-613. IEEE, (2010)