Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Logical Tree Based Secure Rekeying Management for Smart Devices Groups in IoT Enabled WSN., , , , , and . IEEE Access, (2019)Librarians' opinions about library software: a survey of libraries in Lahore., and . Electron. Libr., 25 (6): 766-777 (2007)The changing role of librarians in the digital world: Adoption of Web 2.0 technologies by Pakistani librarians., and . Electron. Libr., 30 (4): 469-479 (2012)Competencies needed for future academic librarians in Pakistan.. Educ. Inf., 20 (1): 27-43 (2002)A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things., , , , and . Int. J. Commun. Syst., (2020)An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF., , , , , , and . Internet Things, (July 2023)Provably secure biometric-based client-server secure communication over unreliable networks., , , , and . J. Inf. Secur. Appl., (2021)A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model., , and . J. Inf. Secur. Appl., (2020)Classical versus reinforcement learning algorithms for unmanned aerial vehicle network communication and coverage path planning: A systematic literature review., , , , and . Int. J. Commun. Syst., (2023)An improved lightweight multiserver authentication scheme., , , , , and . Int. J. Commun. Syst., (2017)