Showing 1 - 10 results of 10 for search 'Muhammad Khurram , Khan', query time: 0.04s
Refine Results
-
1
-
2
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET by Goudarzi, Shidrokh, Soleymani, Seyed Ahmad, Anisi, Mohammad Hossein, Azgomi, Mohammad Abdollahi, Movahedi, Zeinab, Kama, Nazri, Mohd. Rusli, Hazlifah, Muhammad Khurram Khan, Muhammad Khurram Khan
Published 2022Article -
3
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks by Muhammad Khurram Khan, Yang Xiang, Shi-Jinn Horng, Hsiao-Hwa Chen
Published 2013-10-01
Article -
4
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014 by Muhammad Khurram Khan, Yang Xiang, Shi-Jinn Horng, Hsiao-Hwa Chen
Published 2015-07-01
Article -
5
-
6
-
7
-
8
-
9
-
10