Author of the publication

Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges.

, , , , and . Int. J. Commun. Syst., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Intelligent Vehicles (IoIV): An Intelligent VANET Based Computing via Predictive Modeling., , and . IEEE Access, (2023)Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles., , , , , and . IEEE Access, (2021)Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs., , , , and . Sensors, 21 (8): 2718 (2021)Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices., , , and . Int. J. Autom. Comput., 13 (4): 350-363 (2016)A Novel Delay Constraint Location Privacy Scheme in VANETs., , , and . VTC Fall, page 1-5. IEEE, (2017)The ingenuity of malware substitution: Bypassing next-generation Antivirus., , and . ICAC, page 1-5. IEEE, (2021)Risk Assessment of SCADA Cyber Attack Methods: A Technical Review on Securing Automated Real-time SCADA Systems., , , , and . ICAC, page 1-6. IEEE, (2022)Complex Adaptive Systems: A Data Modelling and Engineering Perspective., , , and . ICISDM, page 44-48. ACM, (2018)Comparative Analysis of State-of-the-Art Deep Learning Models for Detecting COVID-19 Lung Infection from Chest X-Ray Images., , , , , , , and . CoRR, (2022)Software Defined Network (SDN) Based Internet of Things (IoT): A Road Ahead., , , and . ICFNDS, page 15:1-15:8. ACM, (2017)