Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PSCLS: provably secure certificateless signature scheme for IoT device on cloud., , , and . J. Supercomput., 79 (5): 4962-4982 (March 2023)GMCA: a greedy multilevel clustering algorithm for data gathering in wireless sensor networks., , and . Int. J. Commun. Networks Distributed Syst., 11 (2): 198-213 (2013)Intersection Attack on Anonymity in VANET., , and . Trans. Comput. Sci., (2013)Regularized Deep Convolutional Generative Adversarial Network., , , and . CVIP (3), volume 1378 of Communications in Computer and Information Science, page 452-464. Springer, (2020)Optimizing Pseudonym Updation for Anonymity in VANETS., and . APSCC, page 1633-1637. IEEE Computer Society, (2008)Node Scheduling and Compressed Sampling for Event Reporting in WSNs., , and . IEEE Trans. Netw. Sci. Eng., 6 (3): 418-431 (2019)Comparative Analysis of Intelligent Driving and Safety Assistance Systems Using YOLO and SSD Model of Deep Learning., , , and . Int. J. Inf. Syst. Model. Des., 12 (1): 131-146 (2021)Pseudonym Based Mechanism for Sustaining Privacy in VANETs., , , and . CICSyN, page 420-425. IEEE Computer Society, (2009)QoS-Based Pure Adaptive Routing in MANETs., and . ICETET, page 228-233. IEEE Computer Society, (2008)Intelligent Industrial Data Acquisition and Energy Monitoring using Wireless Sensor Networks., , , and . Int. J. Grid High Perform. Comput., 2 (3): 44-59 (2010)