Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure message communication among vehicles using elliptic curve cryptography in smart cities., , , , and . CITS, page 1-6. IEEE, (2016)Service Management Algorithm-based on Security Monitoring Mechanism for Fog IoT Users in Fog Networks., , , , and . ICETE (1), page 13-19. SciTePress, (2019)A Kinect-Based System for Golf Beginners' Training., , , , and . ITCS, volume 253 of Lecture Notes in Electrical Engineering, page 121-129. Springer, (2013)RAKI: A Robust ECC Based Three-party Authentication and Key Agreement Scheme for Medical IoT., , , , , and . GLOBECOM, page 1175-1180. IEEE, (2022)Amalgamation of Blockchain and AI to Classify Malicious Behavior of Autonomous Vehicles., , , , and . CITS, page 1-5. IEEE, (2021)An Efficient EUF-ID-CMA Secure Identity-based Short Signature Scheme using Discrete Logarithm., , and . CITS, page 1-5. IEEE, (2019)A Survey of DDoS Attacks Detection Schemes in SDN Environment., , , , , , and . CITS, page 1-6. IEEE, (2023)Time efficient dynamic threshold-based load balancing technique for Cloud Computing., , , , , and . CITS, page 161-165. IEEE, (2017)Image-sensing enabled augmented reality for perceived exertion and cardiorespiratory endurance., , and . IET Wirel. Sens. Syst., (2013)Body Language and Augmented Reality Learning Environment., and . MUE, page 246-250. IEEE Computer Society, (2011)