Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices., , , and . Int. J. Autom. Comput., 13 (4): 350-363 (2016)Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles., , , , , and . IEEE Access, (2021)Internet of Intelligent Vehicles (IoIV): An Intelligent VANET Based Computing via Predictive Modeling., , and . IEEE Access, (2023)Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs., , , , and . Sensors, 21 (8): 2718 (2021)A Novel Delay Constraint Location Privacy Scheme in VANETs., , , and . VTC Fall, page 1-5. IEEE, (2017)The framework for efficient passphrase-based multifactor authentication in cloud computing., , and . ICAC, page 37-41. IEEE, (2016)ScreenStealer: Addressing Screenshot attacks on Android devices., and . ICAC, page 336-341. IEEE, (2016)A methodology to characterize and compute correlation between traffic congestion and health issues via social media., , , and . ICAC, page 1-6. IEEE, (2018)EK-Healthcare: Effectiveness of IoT in the Medical Field with Enhanced Features., and . ICAC, page 1-6. IEEE, (2018)A Novel Model for HD video calling in 5G Networks., , , , and . ICAC, page 1-6. IEEE, (2019)