Author of the publication

Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things.

, , , , , and . IEEE Internet of Things Journal, 7 (4): 2679-2689 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System., , , , , , , and . IEEE Trans. Ind. Informatics, 16 (5): 3311-3321 (2020)Cyber Security in Social Media: Challenges and the Way Forward., , and . IT Prof., 21 (2): 41-49 (2019)A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration., , , and . SpaCCS Workshops, volume 10658 of Lecture Notes in Computer Science, page 581-592. Springer, (2017)Hardware design and modeling of lightweight block ciphers for secure communications., , , , and . Future Gener. Comput. Syst., (2018)Secure and efficient data delivery for fog-assisted wireless body area networks., , , and . Peer-to-Peer Netw. Appl., 12 (5): 1289-1307 (2019)Defining Metrics for Comparing Threat Intelligence Solutions Through the Lens of the Analyst., and . UEMCON, page 192-199. IEEE, (2023)CAre: Certificate Authority Rescue Engine for Proactive Security., , and . ISPAN-FCST-ISCC, page 79-86. IEEE Computer Society, (2017)A Framework to Identify Security and Privacy Issues of Smart Home Devices., and . UEMCON, page 135-143. IEEE, (2018)Vulnerabilities and Attacks Analysis for Military and Commercial IoT Drones., and . UEMCON, page 26-32. IEEE, (2018)Hierarchical steganography using novel optimum quantization technique., , , and . Signal Image Video Process., 7 (6): 1029-1040 (2013)