Author of the publication

A secure and efficient key agreement framework for critical energy infrastructure using mobile device.

, , , , , and . Telecommun. Syst., 78 (4): 539-557 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing., , and . Int. J. E Serv. Mob. Appl., 10 (3): 61-83 (2018)The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds., , , , , , and . Int. J. Cloud Appl. Comput., 13 (1): 1-24 (2023)Assessment of Honeypots: Issues, Challenges and Future Directions., and . Int. J. Cloud Appl. Comput., 8 (1): 21-54 (2018)A client-server JavaScript code rewriting-based framework to detect the XSS worms from online social network., , and . Concurr. Comput. Pract. Exp., (2019)Defending against Phishing Attacks: Taxonomy of Methods, Current Issues and Future Directions., , and . CoRR, (2017)Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations., , , , , and . IEEE Internet Things J., 6 (2): 1402-1409 (2019)Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain., , , , and . Multim. Tools Appl., 76 (18): 18451-18472 (2017)Survey on atrial fibrillation detection from a single-lead ECG wave for Internet of Medical Things., , , , and . Comput. Commun., (2021)A Rule-Based Expert Advisory System for Restaurants Using Machine Learning and Knowledge-Based Systems Techniques., , , , , and . Int. J. Semantic Web Inf. Syst., 19 (1): 1-25 (2023)Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study., , , , , , and . Int. J. Semantic Web Inf. Syst., 18 (1): 1-24 (2022)