Author of the publication

Secure Healthcare Data Dissemination Using Vehicle Relay Networks.

, , , , , and . IEEE Internet Things J., 5 (5): 3733-3746 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Possible Electromagnetic Hypersensitivity among Cellular Phone Users in Relevance to Self Reported Subjective Symptoms and Sensations and Adopted Safety Measures. Health Informatics - An International Journal (HIIJ), 01 (01): 09-17 (August 2012)Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications., , , , , , and . IEEE Access, (2017)Deep Learning-Based Image Kernel for Inductive Transfer., , , and . CoRR, (2015)Ensuring Privacy and Security in E- Health Records., , , , , , and . CITS, page 1-5. IEEE, (2018)Mobile cloud networking for efficient energy management in smart grid cyber-physical systems., , and . IEEE Wirel. Commun., 23 (5): 100-108 (2016)Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (2): 391-406 (2020)Exploring Cell counting with Neural Arithmetic Logic Units., , , , and . CoRR, (2020)Computing a Minimum Color Path in Edge-Colored Graphs.. SEA², volume 11544 of Lecture Notes in Computer Science, page 35-50. Springer, (2019)Dynamic Multi-objective Virtual Machine Placement in Cloud Data Centers., , , , , , and . SEAA, page 92-99. IEEE, (2019)Detection and analysis of secure intelligent universal designated verifier signature scheme for electronic voting system., , , , , and . J. Supercomput., 70 (1): 177-199 (2014)