Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A reliable adaptive forwarding approach in named data networking., , , , and . Future Gener. Comput. Syst., (2019)Design and QoS of a Wireless System for Real-Time Remote Electrocardiography., , , and . IEEE J. Biomed. Health Informatics, 17 (3): 745-755 (2013)Password typos resilience in honey encryption., , and . ICOIN, page 593-598. IEEE, (2017)A Survey on Security Threats in Blockchain-based Internet of Things Systems., and . ICTC, page 2134-2138. IEEE, (2022)A Comparative Analysis of Searchable Encryption Schemes using SGX., and . ICTC, page 526-528. IEEE, (2020)Downgrading Backward Privacy of Searchable Encryption., , , , and . ICOIN, page 324-328. IEEE, (2022)Secure Device-to-Device Authentication in Mobile Multi-hop Networks., , , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 267-278. Springer, (2014)Analysis of NTP pool monitoring system based on multiple monitoring stations., , and . MobiHoc, page 259-264. ACM, (2022)A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks., , , , and . FGIT-FGCN, volume 56 of Communications in Computer and Information Science, page 405-412. Springer, (2009)Cache Side-Channel Attack on Mail User Agent., , , and . ICOIN, page 236-238. IEEE, (2020)