Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Healthcare Insurance Frauds: Taxonomy and Blockchain-Based Detection Framework (Block-HI)., and . IT Prof., 23 (4): 36-43 (2021)Secure Transmission in Cellular V2X Communications Using Deep Q-Learning., , , and . IEEE Trans. Intell. Transp. Syst., 23 (10): 17167-17176 (2022)Trust in VANET: A Survey of Current Solutions and Future Research Opportunities., , and . IEEE Trans. Intell. Transp. Syst., 22 (5): 2553-2571 (2021)Bio-Inspired Routing Algorithms Survey for Vehicular Ad Hoc Networks., , and . IEEE Commun. Surv. Tutorials, 17 (2): 843-867 (2015)Power and Performance Efficient SDN-Enabled Fog Architecture., , and . CoRR, (2021)ISBORD: Internet Searching based on Resource Description., , and . ICT Express, 3 (1): 48-51 (2017)Landscape: a high performance distributed positioning scheme for outdoor sensor networks., , , and . WiMob (3), page 430-437. IEEE, (2005)0-7803-9181-0.Lightweight authentication protocols for wearable devices., , and . Comput. Electr. Eng., (2017)Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions., , , and . Comput. Networks, (2019)Security Attacks and Solutions in Electronic Health (E-health) Systems., , and . J. Medical Syst., 40 (12): 263:1-263:12 (2016)