Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Key Freshness Scheme for Wireless Sensor Networks., , , and . ITNG, page 169-173. IEEE Computer Society, (2015)Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN., , , and . Peer-to-Peer Netw. Appl., 13 (1): 163-174 (2020)ACE: Adaptive Cooperation in EEDBR for Underwater Wireless Sensor Networks., , , , , , and . BWCCA, page 8-14. IEEE Computer Society, (2014)Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks., and . Q2SWinet, page 17-24. ACM, (2006)An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre., , , , , , and . IEEE Syst. J., 13 (1): 436-446 (2019)Fisher score and Matthews correlation coefficient-based feature subset selection for heart disease diagnosis using support vector machines., , , , , , and . Knowl. Inf. Syst., 58 (1): 139-167 (2019)Entropy Generation on Nanofluid Thin Film Flow of Eyring-Powell Fluid with Thermal Radiation and MHD Effect on an Unsteady Porous Stretching Sheet., , , , and . Entropy, 20 (6): 412 (2018)Flow-based intrusion detection: Techniques and challenges., , and . Comput. Secur., (2017)Development of IMS Privacy & Security Framework for Open IMS Fokus Testbed., and . J. Mobile Multimedia, 2 (3): 225-258 (2006)Information Sharing in Vehicular AdHoc Network., , , , and . Int. J. Comput. Commun. Control, 5 (5): 892-899 (2010)