Author of the publication

Privacy preservation and authentication on secure geographical routing in VANET.

, and . J. Exp. Theor. Artif. Intell., 29 (3): 617-628 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy Based Trusted Ad Hoc On-demand Distance Vector Routing Protocol for MANET., and . WiMob, page 39. IEEE Computer Society, (2007)A comprehensive ensemble pruning framework based on dual-objective maximization trade-off., and . Knowl. Inf. Syst., 66 (9): 5335-5353 (September 2024)Next Generation Network Coding Technique for IoT., and . ICCCNT, page 1-6. IEEE, (2020)Acknowledgement-Based Trust Framework for Wireless Sensor Networks., , and . SPIT, volume 117 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 34-40. Springer, (2012)Enhanced stacking ensemble Model: A statistical ensemble pruning framework to classify anxiety severity for responsive emergency preparedness., , and . Biomed. Signal Process. Control., 87 (Part A): 105523 (January 2024)Privacy preservation and authentication on secure geographical routing in VANET., and . J. Exp. Theor. Artif. Intell., 29 (3): 617-628 (2017)MLGARTC: Machine Learning Based Genetic Approach in RSSI Tree Climbing Path Improvisation of the Mobile Anchor's Using K-Means Clustering of Wireless Sensor Network., and . CoMSO, volume 206 of Smart Innovation, Systems and Technologies, page 213-229. Springer, (2020)Identifying Partitions in Wireless Sensor Network., and . Int. J. Parallel Program., 48 (2): 296-309 (2020)ECG-Signal Based Secret Key Generation (ESKG) Scheme for WBAN and Hardware Implementation., and . Wirel. Pers. Commun., 106 (4): 2037-2052 (2019)Secure Communication over BSN Using Modified Feather Light Weight Block (MFLB) Cipher Encryption., and . J. Softw., 10 (8): 961-970 (2015)