Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Quantum Steganography Protocol for Fog Cloud Internet of Things., , , , and . IEEE Access, (2018)Fog Intelligence for Real-Time IoT Sensor Data Analytics., , , , , , and . IEEE Access, (2017)Secure Medical Blockchain Model., , , , and . Inf., 14 (2): 80 (February 2023)Analysis of Plain and Diversity Combining Hybrid ARQ Protocols Over the m(geq 2)-Ary Asymmetric Channel., , and . IEEE Trans. Inf. Theory, 52 (12): 5550-5558 (2006)A Dynamic Reconfigurable-Based Approach for Connectivity Mismatches of Web Services., and . ICDIPC (2), volume 189 of Communications in Computer and Information Science, page 67-81. Springer, (2011)Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution., , , and . IEEE Access, (2023)On efficient second-order spectral-null codes using sets of m1-balancing functions., , , , , and . ISIT, page 141-145. IEEE, (2013)Big-Data Aggregating, Linking, Integrating and Representing Using Semantic Web Technologies., , and . AMLTA, volume 723 of Advances in Intelligent Systems and Computing, page 331-342. Springer, (2018)Efficient Non-Recursive Design of Second-Order Spectral-Null Codes., , , , , and . IEEE Trans. Inf. Theory, 62 (6): 3084-3102 (2016)Toward cognitive support for automated defect detection., , , , , and . Neural Comput. Appl., 32 (9): 4325-4333 (2020)