Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction., , , , , , and . IEEE Access, (2020)Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.. IMACC, volume 1746 of Lecture Notes in Computer Science, page 307-. Springer, (1999)New mutual agreement protocol to secure mobile RFID-enabled devices., , and . Inf. Secur. Tech. Rep., 13 (3): 151-157 (2008)A Novel Implementation of an AI-Based Smart Construction Safety Inspection Protocol in the UAE., , , , , , and . IEEE Access, (2021)Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices., , , , , and . IEEE Access, (2022)New data poison attacks on machine learning classifiers for mobile exfiltration., , , , , , , , , and . CoRR, (2022)A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication., , , , and . Int. J. Commun. Syst., 24 (4): 461-472 (2011)Enhancement of Key Derivation in Web Service Security - Performance Bottleneck in Real-Time Messaging Systems., , , and . Wireless Personal Communications, 97 (4): 5171-5184 (2017)New Two-Level µTESLA Protocol for IoT Environments., , and . SERVICES, page 84-91. IEEE, (2019)Recent advances of smart glass application security and privacy., and . ICITST, page 65-69. IEEE, (2015)