Author of the publication

Secure Localized Authentication and Billing for Wireless Mesh Networks.

, , , , and . GLOBECOM, page 486-491. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threshold password authentication against guessing attacks in Ad hoc networks., , and . Ad Hoc Networks, 5 (7): 1046-1054 (2007)Provably secure robust threshold partial blind signature., , and . Science in China Series F: Information Sciences, 49 (5): 604-615 (2006)Fine-grained data sharing in cloud computing for mobile devices., , and . INFOCOM, page 2677-2685. IEEE, (2015)An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs., , , , , and . INFOCOM, page 605-613. IEEE, (2010)Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs., , , , and . ICC, page 1-5. IEEE, (2011)Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing., , , and . ICC, page 3909-3914. IEEE, (2015)PAD: Privacy-preserving data dissemination in mobile social networks., and . ICCS, page 243-247. IEEE, (2014)A secure anonymous routing protocol with authenticated key exchange for ad hoc networks., , , and . Computer Standards & Interfaces, 29 (5): 521-527 (2007)A regular expression matching engine with hybrid memories., and . Computer Standards & Interfaces, 36 (5): 880-888 (2014)A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications., and . IEEE Internet of Things Journal, 2 (3): 248-258 (2015)