Author of the publication

Seamless secure anonymous authentication for cloud-based mobile edge computing.

, , and . Comput. Electr. Eng., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems., , , , and . IEEE Access, (2020)Energy Aware Resource Allocation in Multi-Hop Multimedia Routing via the Smart Edge Device., , and . IEEE Access, (2019)Cognitive Intelligence for Monitoring Fractured Post-Surgery Ankle Activity Using Channel Information., , , and . IEEE Access, (2020)Reviewer Credibility and Sentiment Analysis Based User Profile Modelling for Online Product Recommendation., , , , , and . IEEE Access, (2020)A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems., , , and . IEEE Access, (2020)Smart home security: challenges, issues and solutions at different IoT layers., , , , , and . J. Supercomput., 77 (12): 14053-14089 (2021)Multilingual News Feed Analysis using Intelligent Linguistic Particle Filtering Techniques., , , and . ACM Trans. Asian Low Resour. Lang. Inf. Process., 22 (3): 87:1-87:19 (March 2023)The Interplay between the Internet of Things and agriculture: A bibliometric analysis and research agenda., , , , and . Internet Things, (2022)Deming least square regressed feature selection and Gaussian neuro-fuzzy multi-layered data classifier for early COVID prediction., , , , and . Expert Syst. J. Knowl. Eng., (2022)User-centric hybrid semi-autoencoder recommendation system., , , , , and . Multim. Tools Appl., 81 (16): 23091-23104 (2022)