Author of the publication

SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

, , and . Sensors, 18 (2): 666 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-based signcryption from lattices., , , , and . Security and Communication Networks, 8 (18): 3751-3770 (2015)Modelling security message propagation in delay tolerant networks., , , , and . Security and Communication Networks, 5 (1): 51-58 (2012)Asymptotic stability of cellular neural networks with multiple proportional delays., , and . Applied Mathematics and Computation, (2014)Quantum secret sharing for general access structures based on multiparticle entanglements., , and . Quantum Information Processing, 13 (2): 429-443 (2014)An evaluation method of image scrambling degree based on pixel distribution., , , , , and . SocialSec, page 33-38. IEEE, (2018)Design and Realization of a Large-Scale Distributed Intrusion Management System Module., and . PACIIA (2), page 537-540. IEEE Computer Society, (2008)978-0-7695-3490-9.Security Mechanism Research of EMV2000., , , and . Web Intelligence/IAT Workshops, page 307-310. IEEE Computer Society, (2007)A LSB steganography detection algorithm., , and . PIMRC, page 2780-2783. IEEE, (2003)Dyadic Matrices and Their Potential Significance in Cryptography.. AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 308-310. Springer, (1990)Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation., , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 493-502. Springer, (2009)