Author of the publication

Location privacy attacks and defenses in cloud-enabled internet of vehicles.

, , , , , , and . IEEE Wireless Commun., 23 (5): 52-59 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hierarchical Pseudonyms Management Approach for Software-Defined Vehicular Networks., , , , , and . VTC Spring, page 1-5. IEEE, (2016)Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles., , , and . IEEE Trans. Intelligent Transportation Systems, 19 (8): 2627-2637 (2018)Software Defined Networking for Energy Harvesting Internet of Things., , , , and . IEEE Internet of Things Journal, 5 (3): 1389-1399 (2018)Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks., , , and . IEEE Access, (2017)Permissioned Blockchain for Efficient and Secure Resource Sharing in Vehicular Edge Computing., , , , and . CoRR, (2019)Hierarchical mobile cloud with social grouping for secure pervasive healthcare., , , , and . HealthCom, page 609-614. IEEE, (2015)An optimal replenishment strategy in energy harvesting wireless networks with a mobile charger., , , , , , , and . QSHINE, page 433-439. IEEE, (2015)Location privacy attacks and defenses in cloud-enabled internet of vehicles., , , , , , and . IEEE Wireless Commun., 23 (5): 52-59 (2016)On-demand Pseudonym Systems in Geo-Distributed Mobile Cloud Computing., , , , and . CSCloud, page 136-141. IEEE Computer Society, (2016)Cooperative Resource Management in Cloud-Enabled Vehicular Networks., , , , , , and . IEEE Trans. Industrial Electronics, 62 (12): 7938-7951 (2015)