Author of the publication

Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms.

, , , , and . IEEE Internet Things J., 9 (22): 22595-22607 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoT Privacy-Preserving Data Mining With Dynamic Incentive Mechanism., , , , and . IEEE Internet Things J., 11 (1): 777-790 (January 2024)Elastic experiences: designing adaptive interaction for individuals and crowds in the public space., , , , and . OZCHI, page 148-151. ACM, (2011)Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records., , , , and . IEEE Trans. Serv. Comput., 16 (5): 3210-3223 (September 2023)Software Defined Intelligent Building., , , , , and . Int. J. Inf. Secur. Priv., 9 (3): 84-99 (2015)Enhanced Security Identity-Based Privacy-Preserving Authentication Scheme Supporting Revocation for VANETs., , , , and . IEEE Syst. J., 14 (4): 5373-5383 (2020)An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (2): 1280-1291 (2022)3D High-quality Textile Reconstruction with Synthesized Texture., , , , and . ICCS, volume 108 of Procedia Computer Science, page 355-364. Elsevier, (2017)Privacy-Preserving Cloud Auditing with Multiple Uploaders., , , and . ISPEC, volume 10060 of Lecture Notes in Computer Science, page 224-237. (2016)Generalized public-key cryptography with tight security., , and . Inf. Sci., (2019)Certificateless aggregate signature scheme secure against fully chosen-key attacks., , , , and . Inf. Sci., (2020)