Author of the publication

A lightweight authentication and secure data access between fog and IoT user.

, , , and . Int. J. Electron. Bus., 16 (1): 77-87 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cognitive Intelligence for Monitoring Fractured Post-Surgery Ankle Activity Using Channel Information., , , and . IEEE Access, (2020)Reviewer Credibility and Sentiment Analysis Based User Profile Modelling for Online Product Recommendation., , , , , and . IEEE Access, (2020)A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems., , , and . IEEE Access, (2020)Smart home security: challenges, issues and solutions at different IoT layers., , , , , and . J. Supercomput., 77 (12): 14053-14089 (2021)User-centric hybrid semi-autoencoder recommendation system., , , , , and . Multim. Tools Appl., 81 (16): 23091-23104 (2022)A novel approach of error detection and correction for efficient energy in wireless networks., , and . Multim. Tools Appl., 78 (2): 1345-1373 (2019)Cognition in UAV-Aided 5G and Beyond Communications: A Survey., , and . IEEE Trans. Cogn. Commun. Netw., 6 (3): 872-891 (2020)Intelligence in the Internet of Medical Things era: A systematic review of current and future trends., , and . Comput. Commun., (2020)Deming least square regressed feature selection and Gaussian neuro-fuzzy multi-layered data classifier for early COVID prediction., , , , and . Expert Syst. J. Knowl. Eng., (2022)Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems., , , , and . IEEE Access, (2020)