Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities., , , and . Comput. Sci. Inf. Syst., 16 (1): 1-17 (2019)Improvement of the Efficient Secret Broadcast Scheme., , and . IEICE Trans. Inf. Syst., 93-D (12): 3396-3399 (2010)Intrinsic authentication of multimedia objects using biometric data manipulation., , , , and . Int. Arab J. Inf. Technol., 9 (4): 336-342 (2012)A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata., , , and . J. Netw. Comput. Appl., 36 (1): 235-248 (2013)Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies., , , , , and . CoRR, (2021)Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems., , , , and . J. Medical Syst., 38 (6): 24 (2014)Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey., , , , , and . Comput. Secur., (2020)A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity., , , , , and . Secur. Commun. Networks, 9 (15): 2643-2655 (2016)A blockchain-based conditional privacy-preserving authentication scheme for edge computing services., , , , and . J. Inf. Secur. Appl., (2022)An efficient wavelet-tree-based watermarking method., , , , , and . Expert Syst. Appl., 38 (12): 14357-14366 (2011)