Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SDN-Enabled Multi-Attribute-Based Secure Communication for Smart Grid in IIoT Environment., , , , and . IEEE Trans. Ind. Informatics, 14 (6): 2629-2640 (2018)Distributed Database Management Techniques for Wireless Sensor Networks., , , and . IEEE Trans. Parallel Distributed Syst., 26 (2): 604-620 (2015)Data Dissemination in Vehicular Networks Using Context Spaces., , , , , , and . GLOBECOM Workshops, page 1-7. IEEE, (2015)Intelligent Network Security Monitoring Based on Optimum-Path Forest Clustering., , , , , , and . IEEE Netw., 33 (2): 126-131 (2019)Metaheuristic Scheduling for Cloud: A Survey., and . IEEE Syst. J., 8 (1): 279-291 (2014)Resource usage prediction algorithms for optimal selection of multimedia content delivery methods., , , , , , , and . ICC, page 5903-5909. IEEE, (2015)Security Assured CNN-Based Model for Reconstruction of Medical Images on the Internet of Healthcare Things., , , , , , , and . IEEE Access, (2020)An Advanced and Secure Symbian-Based Mobile Approach for Body Sensor Networks Interaction., , and . Int. J. E Health Medical Commun., 2 (1): 1-16 (2011)Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment., , , , , and . IEEE Access, (2018)Privacy-Preserving Big Data Security for IoT With Federated Learning and Cryptography., , , and . IEEE Access, (2023)