Author of the publication

A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System.

, , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 141-156. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain-based Secure CIDS Operation., , , , and . CSNet, page 103-106. IEEE, (2021)Anomaly Detection in Wireless Sensor Network., , and . J. Networks, 9 (11): 2914-2924 (2014)Internet Traffic Classification Using an Ensemble of Deep Convolutional Neural Networks., , , and . FlexNets@SIGCOMM, page 38-43. ACM, (2021)Establishing secured communications in cluster based wireless sensor networks., , and . ISWPC, page 1-6. IEEE, (2013)(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System., , , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 380-392. Springer, (2013)A Lossless Compression Technique for Huffman-based Differential Encoding in IoT for Smart Agriculture., , , and . Int. J. Uncertain. Fuzziness Knowl. Based Syst., 29 (Suppl-2): 317-332 (2021)What is the first step in designing an application protocol for wireless sensor networks (WSNs)?, and . SAS, page 333-338. IEEE, (2014)Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs., , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 367-379. Springer, (2013)A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System., , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 141-156. Springer, (2014)Stock price prediction: comparison of different moving average techniques using deep learning model., , , and . Neural Comput. Appl., 36 (11): 5861-5871 (April 2024)