Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CAPM: Context-Aware Privacy Model for IoT-Based Smart Hospitals., , and . IWCMC, page 1139-1144. IEEE, (2019)Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments., , and . J. Ambient Intell. Humaniz. Comput., 9 (5): 1527-1539 (2018)An efficient biometric-based continuous authentication scheme with HMM prehensile movements modeling., , and . J. Inf. Secur. Appl., (2021)Secure and Efficient Key Exchange Mechanism for Heterogeneous Connected Objects., , , , and . Wirel. Pers. Commun., 120 (4): 2631-2652 (2021)Securing 5G Network Slices with Adaptive Machine Learning Models as-a-Service: A Novel Approach., , and . GLOBECOM, page 4754-4759. IEEE, (2023)Secure and efficient sharing aggregation scheme for data protection in WSNs., , , and . ISSPIT, page 432-437. IEEE Computer Society, (2015)Autonomous Vehicle Security: Literature Review of Real Attack Experiments., , and . CRiSIS, volume 12528 of Lecture Notes in Computer Science, page 255-272. Springer, (2020)Secure Data Processing for Industrial Remote Diagnosis and Maintenance., , , and . CRiSIS, volume 12528 of Lecture Notes in Computer Science, page 335-346. Springer, (2020)User Mobility Dataset for 5G Networks Based on GPS Geolocation., , , and . CAMAD, page 128-133. IEEE, (2022)Secure and reliable certificate chains recovery protocol for mobile ad hoc networks., , , , and . J. Netw. Comput. Appl., (2016)