Author of the publication

A secure and cloud-based medical records access scheme for on-road emergencies.

, , , and . CCNC, page 1-8. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OS Independent and Hardware-Assisted Insider Threat Detection and Prevention Framework., , , , and . MILCOM, page 926-932. IEEE, (2018)Utilizing Advanced Metering Infrastructure to Build a Public Key Infrastructure for Electric Vehicles., and . DIVANet@MSWiM, page 91-98. ACM, (2017)Improving gateway safety in wireless sensor networks using cognitive techniques., , and . Int. J. Sens. Networks, 2 (5/6): 331-340 (2007)Improving Sustainability of Cryptocurrency Payment Networks for IoT Applications., , and . ICC Workshops, page 1-6. IEEE, (2020)A Heuristic-Based Private Bitcoin Payment Network Formation Using Off-Chain Links., , , , and . Blockchain, page 294-301. IEEE, (2019)SDN-based resilience for smart grid communications., , and . NFV-SDN, page 31-33. IEEE, (2015)Sink repositioning for enhanced performance in wireless sensor networks., , and . Comput. Networks, 49 (4): 512-534 (2005)Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach., , , and . IEEE Trans. Netw. Sci. Eng., 8 (1): 751-764 (2021)EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks., , , , , and . CoRR, (2018)LNMesh: Who Said You need Internet to send Bitcoin? Offline Lightning Network Payments using Community Wireless Mesh Networks., , , and . WoWMoM, page 261-270. IEEE, (2023)