Author of the publication

A Secure Hybrid Cloud Enabled architecture for Internet of Things.

, , , , , and . WF-IoT, page 274-279. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

C3HAC: A Controller Placement Approach For SDWSN., , and . TENCON, page 935-940. IEEE, (2021)Mitigating Content Poisoning in Content Centric Network: A Lightweight Approach., and . ICCCNT, page 1-6. IEEE, (2019)Distance-aware Hierarchical Data-collecting Path Selection for Mobile Sink in Sparse WSNs., , , and . WF-IoT, page 1-6. IEEE, (2022)BD-Trust: behavioural and data trust management scheme for internet of things., , and . J. Ambient Intell. Humaniz. Comput., 14 (12): 16195-16207 (December 2023)BLAST-IoT: BLockchain Assisted Scalable Trust in Internet of Things., , , and . Comput. Electr. Eng., 109 (Part A): 108752 (July 2023)A Secure Hybrid Cloud Enabled architecture for Internet of Things., , , , , and . WF-IoT, page 274-279. IEEE Computer Society, (2015)Time synchronization protocol for 6LoWPAN., , and . ICACCI, page 1855-1860. IEEE, (2013)TOAR: transmission-aware opportunistic ad hoc routing protocol., and . EURASIP J. Wirel. Commun. Netw., (2013)Modelling energy efficiency of OR protocols in wireless networks., , and . Int. J. Ad Hoc Ubiquitous Comput., 16 (1): 42-57 (2014)SBI-DHGR: Skeleton-based intelligent dynamic hand gestures recognition., , and . Expert Syst. Appl., (December 2023)