Author of the publication

Secure handoff technique with reduced authentication delay in wireless mesh network.

, and . Int. J. Adv. Intell. Paradigms, 13 (1/2): 130-154 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure, Energy- and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System., , , , , , and . Sensors, 19 (9): 2119 (2019)Probabilistic Verification Scenarios with Reduced Authentication Delay for Handoff Clients in Mesh Networks., , , , and . Wireless Personal Communications, 104 (4): 1553-1571 (2019)Extended Cell Planning for Capacity Expansion and Power Optimization by Using MEMETIC Algorithm., , , and . Int. J. Wirel. Networks Broadband Technol., 2 (2): 36-46 (2012)Prediction of malicious objects using prey-predator model in Internet of Things (IoT) for smart cities., , , and . Comput. Ind. Eng., (2022)Non-Trivial Software Clone Detection Using Program Dependency Graph., and . Int. J. Open Source Softw. Process., 8 (2): 1-24 (2017)Correlation and Performance Estimation of Clone Detection Tools., and . Int. J. Open Source Softw. Process., 9 (2): 55-71 (2018)Secure Blockchain-Internet of Vehicles (B-IoV) Mechanism using DPSO and M-ITA Algorithms., , and . J. Inf. Secur. Appl., (2022)Aspects of Trusted Routing Communication in Smart Networks., , and . Wireless Personal Communications, 98 (2): 2367-2387 (2018)A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology., , , , and . Multimedia Tools Appl., 79 (15-16): 9711-9733 (2020)SLA and Performance Efficient Heuristics for Virtual Machines Placement in Cloud Data Centers., and . Int. J. Grid High Perform. Comput., 9 (3): 17-33 (2017)