Author of the publication

Identifying the factors influencing digital library use among research students: a case of National Digital Library of Pakistan.

, , and . Digit. Libr. Perspect., 37 (3): 192-208 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Competencies needed for future academic librarians in Pakistan.. Educ. Inf., 20 (1): 27-43 (2002)The changing role of librarians in the digital world: Adoption of Web 2.0 technologies by Pakistani librarians., and . Electron. Libr., 30 (4): 469-479 (2012)Sustainable development challenges in libraries: A systematic literature review (2000--2020), , and . The Journal of Academic Librarianship, 47 (3): 102347 (2021)Going green libraries; Sustainable development challenges; Sustainable development libraries; Sustainable literature reviews.An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF., , , , , , and . Internet Things, (July 2023)Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF., , , , , and . IEEE Trans. Veh. Technol., 70 (11): 12158-12167 (2021)Modified Red Fox Optimizer With Deep Learning Enabled False Data Injection Attack Detection., , , , , and . IEEE Access, (2023)An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems., , , , and . Multim. Tools Appl., 76 (12): 14225-14245 (2017)A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System., , , , , and . IEEE Trans. Ind. Informatics, 19 (2): 1683-1690 (2023)Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology., , , , and . Digit. Commun. Networks, 7 (2): 235-244 (2021)Content authentication and tampering detection of Arabic text: an approach based on zero-watermarking and natural language processing., , , , , and . Pattern Anal. Appl., 25 (1): 47-62 (2022)