Author of the publication

Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network.

, , , and . Wireless Personal Communications, 114 (1): 629-655 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network., , , and . Wireless Personal Communications, 114 (1): 629-655 (2020)Segmented patching broadcasting protocol for video data., , and . Comput. Commun., 32 (4): 679-684 (2009)Selective α-Coverage Based Heuristic in Wireless Sensor Networks., , and . Wirel. Pers. Commun., 97 (1): 1623-1636 (2017)SMAC-AS: MAC Based Secure Authentication Scheme for Wireless Sensor Network., , , and . Wirel. Pers. Commun., 107 (2): 1289-1308 (2019)Genetic algorithm-based meta-heuristic for target coverage problem., , and . IET Wirel. Sens. Syst., 8 (4): 170-175 (2018)A PKC-based user authentication scheme without smart card., , and . J. Intell. Fuzzy Syst., 35 (5): 5379-5390 (2018)EMCloud: A hierarchical volunteer cloud with explicit mobile devices., , , and . Int. J. Commun. Syst., (2018)A Trend Analysis of Significant Topics Over Time in Machine Learning Research., , , and . SN Comput. Sci., 2 (6): 469 (2021)NEECP: Novel energy-efficient clustering protocol for prolonging lifetime of WSNs., , , , and . IET Wirel. Sens. Syst., 6 (5): 151-157 (2016)Flood susceptibility mapping using extremely randomized trees for Assam 2020 floods., and . Ecol. Informatics, (2022)