Author of the publication

Erratum to: Secure IoT framework and 2D architecture for End-To-End security.

, , , , , and . J. Supercomput., 74 (8): 3536 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An extension of TYT algorithm for GF((2n)m) using precomputation., , , and . Inf. Process. Lett., 92 (5): 231-234 (2004)The intelligent IoT common service platform architecture and service implementation., , and . J. Supercomput., 74 (9): 4242-4260 (2018)Toward Enhanced Attack Detection and Explanation in Intrusion Detection System-Based IoT Environment Data., , , , and . IEEE Access, (2023)A fast ARX model-based image encryption scheme., , , and . Multim. Tools Appl., 75 (22): 14685-14706 (2016)Improved Computation of Square Roots in Specific Finite Fields., , and . IEEE Trans. Computers, 58 (2): 188-196 (2009)Efficient Software Implementation of Ring-LWE Encryption on IoT Processors., , , and . IEEE Trans. Computers, 69 (10): 1424-1433 (2020)An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno., , , , , , and . Int. J. Netw. Comput., 8 (2): 341-350 (2018)A High-performance ECC Processor over Curve448 based on a Novel Variant of the Karatsuba Formula for Asymmetric Digit Multiplier., , , and . IACR Cryptol. ePrint Arch., (2022)Corrigendum to "Nonintrusive Load Monitoring Based on Advanced Deep Learning and Novel Signature"., , and . Comput. Intell. Neurosci., (2018)Consecutive Operand-Caching Method for Multiprecision Multiplication, Revisited., and . J. Inform. and Commun. Convergence Engineering, 13 (1): 27-35 (2015)