Author of the publication

Behavior of attacker and some new possible attacks in Vehicular Ad hoc Network (VANET).

, , , and . ICUMT, page 1-8. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation., , and . TIIS, 6 (9): 2405-2423 (2012)A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS)., , and . ICITST, page 1-7. IEEE, (2010)Finest authorizing member of common criteria certification., , , , , , and . CyberSec, page 155-160. IEEE, (2012)Scalable Rekeying Algorithm in IEEE 802.16e., , , , , and . APCC, page 726-730. IEEE, (2011)Understanding vulnerabilities by refining taxonomy., , and . IAS, page 25-29. IEEE, (2011)Practicable Unified Security, Trust and Privacy (STP) Framework for Federated Access Management (FAM)., , and . TrustCom, page 1411-1416. IEEE Computer Society, (2012)A Novel Energy Efficient Key Distribution Scheme for Mobile WiMAX Networks., , , and . Wireless Personal Communications, 92 (2): 727-748 (2017)An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices., , , , and . CoRR, (2014)Trusted anonymizer-based RFID system with integrity verification., , and . IAS, page 98-103. IEEE, (2011)Forming Virtualized Secure Framework for Location Based Services (LBS) using Direct Anonymous Attestation (DAA) protocol., , , and . WiMob, page 622-629. IEEE Computer Society, (2010)