Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security mechanisms and data access protocols in innovative wireless networks., , , and . Int. J. Distributed Sens. Networks, (2018)Finding a suitable hop-to-hop busty traffic transmission approach for underwater acoustic networks: handshake-based vs. handshake-free MAC protocols., , , and . Int. J. Ad Hoc Ubiquitous Comput., 27 (3): 222-231 (2018)A Flexible Keyphrase Extraction Technique for Academic Literature., , , , and . ICCSCI, volume 135 of Procedia Computer Science, page 553-563. Elsevier, (2018)A Secure Hybrid Authentication Scheme Using Passpoints and Press Touch Code., , , , and . IEEE Access, (2019)Raising fairness issue of vehicle routing problem., , , and . ICITE, page 13-17. IEEE, (2016)UDTN-RS: A New Underwater Delay Tolerant Network Routing Protocol for Coastal Patrol and Surveillance., , , , , and . IEEE Access, (2023)Hybrid Henry Gas Solubility Optimization Algorithm with Dynamic Cluster-to-Algorithm Mapping for Search-based Software Engineering Problems., , , and . CoRR, (2021)On the performance of unsynchronized distributed MAC protocols in deep water acoustic networks., , , and . WUWNet, page 17. ACM, (2011)A Store-and-Delivery Based MAC Protocol for Air-Ground Collaborative Wireless Networks for Precision Agriculture., , , , and . ICPADS, page 792-796. IEEE Computer Society, (2015)iWorksafe: Towards Healthy Workplaces During COVID-19 With an Intelligent Phealth App for Industrial Settings., , , , , , , , , and 5 other author(s). IEEE Access, (2021)