Author of the publication

An Enhanced Machine Learning-Based Biometric Authentication System Using RR-Interval Framed Electrocardiograms.

, , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancement of Key Derivation in Web Service Security - Performance Bottleneck in Real-Time Messaging Systems., , , and . Wireless Personal Communications, 97 (4): 5171-5184 (2017)Recent advances of smart glass application security and privacy., and . ICITST, page 65-69. IEEE, (2015)New Two-Level µTESLA Protocol for IoT Environments., , and . SERVICES, page 84-91. IEEE, (2019)Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.. IMACC, volume 1746 of Lecture Notes in Computer Science, page 307-. Springer, (1999)A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication., , , , and . Int. J. Commun. Syst., 24 (4): 461-472 (2011)IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction., , , , , , and . IEEE Access, (2020)New mutual agreement protocol to secure mobile RFID-enabled devices., , and . Inf. Secur. Tech. Rep., 13 (3): 151-157 (2008)A Verified Protocol for Secure Autonomous and Cooperative Public Transportation in Smart Cities., , , and . ICC Workshops, page 1-6. IEEE, (2021)A Novel Implementation of an AI-Based Smart Construction Safety Inspection Protocol in the UAE., , , , , , and . IEEE Access, (2021)Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices., , , , , and . IEEE Access, (2022)