Personal Information
Organization / Workplace
Pakistan Pakistan
Occupation
Assistant Professor in LGU-Lahore,Pakistan.
Industry
Technology / Software / Internet
Website
www.irshadsomra.com
Tags
security
vanet
attacker
attacks
trust
applications
malicious user
behavior
trusted user
trusted platform module (tpm)
application
vsrg
tpm
attack
user
safety applications
vehicular communication
trust grades.
safety and non safety applications
trusted platform module (tpm).
internet attack
safety and non-safety application
end user.
flying ad-hoc network (manet)
vehicular ad-hoc network (vanet)
mobile ad-hoc network (manet)
pervasive computing.
cloud computing
trusted computing
computing methods
safety and non safety application
users
attackers and attacks
trust levels.
trust safety and non safety applications
tamper proof device (tpd)
event data recorder (edr)
security hardware modules
intelligent transportation system (its)
malicious attacks
multi-level integrated model
availability (cia)
integrity
confidentiality
security goals
vehicular ad hoc network (vanet)
threats levels
attackers
security requirements
dos attack
secure business
stp
privacy
ecosystem
behaviour
timing attack
classes
model
non safety applications
vss
its
peer to peer trust
See more
Presentations
(23)Likes
(2)Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in VANET
Dr.Irshad Ahmed Sumra
•
3 years ago
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey
Dr.Irshad Ahmed Sumra
•
3 years ago
Personal Information
Organization / Workplace
Pakistan Pakistan
Occupation
Assistant Professor in LGU-Lahore,Pakistan.
Industry
Technology / Software / Internet
Website
www.irshadsomra.com
Tags
security
vanet
attacker
attacks
trust
applications
malicious user
behavior
trusted user
trusted platform module (tpm)
application
vsrg
tpm
attack
user
safety applications
vehicular communication
trust grades.
safety and non safety applications
trusted platform module (tpm).
internet attack
safety and non-safety application
end user.
flying ad-hoc network (manet)
vehicular ad-hoc network (vanet)
mobile ad-hoc network (manet)
pervasive computing.
cloud computing
trusted computing
computing methods
safety and non safety application
users
attackers and attacks
trust levels.
trust safety and non safety applications
tamper proof device (tpd)
event data recorder (edr)
security hardware modules
intelligent transportation system (its)
malicious attacks
multi-level integrated model
availability (cia)
integrity
confidentiality
security goals
vehicular ad hoc network (vanet)
threats levels
attackers
security requirements
dos attack
secure business
stp
privacy
ecosystem
behaviour
timing attack
classes
model
non safety applications
vss
its
peer to peer trust
See more