Author:
Piramuthu Otto B.,Caesar Matthew
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference36 articles.
1. Mohar SS, Goyal S, Kaur R (2022) Localization of sensor nodes in wireless sensor networks using bat optimization algorithm with enhanced exploration and exploitation characteristics. J Supercomput 332:22
2. Ahmed S, Shamshad S, Ghaffar Z, Mahmood K, Kumar N, Parizi RM, Choo K-KR (2021) Signcryption based authenticated and key exchange protocol for EI-Based V2G environment. IEEE Trans Smart Grid 12(6):5290–5298
3. Mahmood K, Shamshad S, Kumari S, Khan MK, Obaidat MS (2020) Comment on lightweight secure message broadcasting protocol for Vehicle-to-Vehicle communication. IEEE Syst J 15(1):1366–1368
4. Shamshad S, Saleem MA, Obaidat MS, Shamshad U, Mahmood K, Ayub MF, On the security of a lightweight privacy-preserving authentication protocol for VANETs. IEEE Int Conf Artif Intell Smart Syst (ICAIS), 1766-1770, 2021
5. Shamshad S, Obaidat MS, Saleem MA, Shamshad U, Mahmood K, (2021) Security analysis on an efficient and provably secure authenticated key agreement protocol for Fog-based Vehicular Ad-Hoc Networks. Int Conf Artif Intell Smart Syst (ICAIS), 1754-1759
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献