Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure message communication among vehicles using elliptic curve cryptography in smart cities., , , , and . CITS, page 1-6. IEEE, (2016)Time efficient dynamic threshold-based load balancing technique for Cloud Computing., , , , , and . CITS, page 161-165. IEEE, (2017)Image-sensing enabled augmented reality for perceived exertion and cardiorespiratory endurance., , and . IET Wirel. Sens. Syst., (2013)Body Language and Augmented Reality Learning Environment., and . MUE, page 246-250. IEEE Computer Society, (2011)Service Management Algorithm-based on Security Monitoring Mechanism for Fog IoT Users in Fog Networks., , , , and . ICETE (1), page 13-19. SciTePress, (2019)A Kinect-Based System for Golf Beginners' Training., , , , and . ITCS, volume 253 of Lecture Notes in Electrical Engineering, page 121-129. Springer, (2013)An Efficient EUF-ID-CMA Secure Identity-based Short Signature Scheme using Discrete Logarithm., , and . CITS, page 1-5. IEEE, (2019)Amalgamation of Blockchain and AI to Classify Malicious Behavior of Autonomous Vehicles., , , , and . CITS, page 1-5. IEEE, (2021)A Survey of DDoS Attacks Detection Schemes in SDN Environment., , , , , , and . CITS, page 1-6. IEEE, (2023)A novel media independent handover-based approach for vertical handover over heterogeneous wireless networks., , , , and . Int. J. Commun. Syst., 27 (5): 811-824 (2014)