Author of the publication

Android-based Cryptocurrency Wallets: Attacks and Countermeasures.

, , , , , and . Blockchain, page 9-16. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effectiveness of Authentication Schemes in the Internet of Things Networks with Different Structural Topologies., , and . IWCMC, page 1118-1123. IEEE, (2023)Iterative decoding of multi-dimensional concatenated single parity check codes., , and . ICC, page 131-135. IEEE, (1998)Design of wide-sense nonblocking multicast ATM switches., , and . IEEE Communications Letters, 2 (5): 146-148 (1998)Blockchain-based authentication and secure communication in IoT networks., , , and . Secur. Priv., (November 2023)IAPI: An intelligent adaptive PI active queue management scheme., , and . Comput. Commun., 35 (18): 2281-2293 (2012)A Fast Reactive Congestion Control Method for ATM Networks. page 1290-1300. (1994)Performance Modelling of TCP Over Wireless Links with Hybrid ARQ, , , , and . page 2267-2276. (2005)Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks., , and . IEEE Trans. Wirel. Commun., 14 (1): 389-398 (2015)Delay-aware and cost-efficient probabilistic transmission for opportunistic networks., , , , , and . IET Networks, 9 (6): 372-377 (2020)Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering., , , and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 212-227. Springer, (2016)