Author of the publication

Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities.

, , and . IEEE Trans. Ind. Informatics, 14 (8): 3567-3569 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Waiting Time Minimized Charging and Discharging Strategy Based on Mobile Edge Computing Supported by Software-Defined Network., , , , and . IEEE Internet Things J., 7 (7): 6088-6101 (2020)Quantum entanglement and non-locality based secure computation for future communication., , , , and . IET Inf. Secur., 5 (1): 69-79 (2011)A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions., , , , and . J. Supercomput., 75 (8): 4543-4574 (2019)Improved RF4CE key agreement approach involving two-phase key distribution for smart-convergence home device., , and . Secur. Commun. Networks, 5 (9): 974-986 (2012)Challenges and opportunities in next-generation cyberspace security., , , and . Secur. Commun. Networks, 9 (6): 455-456 (2016)Perceptual quality based error control for scalable on-demand streaming in next-generation wireless networks., , , and . Telecommun. Syst., 52 (2): 445-459 (2013)S-Detector: an enhanced security model for detecting Smishing attack for mobile computing., , , and . Telecommun. Syst., 66 (1): 29-38 (2017)Editorial., , , , and . J. Intell. Manuf., 21 (5): 593-594 (2010)Remote Software Update in Trusted Connection of Long Range IoT Networking Integrated With Mobile Edge Cloud., , and . IEEE Access, (2018)Device Authentication In Wireless And Pervasive Environments., , and . Intell. Autom. Soft Comput., 16 (3): 399-418 (2010)