Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dual watermarking: An approach for securing digital documents., , and . Multim. Tools Appl., 79 (11-12): 7339-7354 (2020)Metaheuristics for scheduling of heterogeneous tasks in cloud computing environments: Analysis, performance evaluation, and future directions., , , , and . Simul. Model. Pract. Theory, (2021)Fog-Orchestrated and Server-Controlled Anonymous Group Authentication and Key Agreement., , , and . IEEE Access, (2019)Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks., , , and . IEEE Access, (2019)Understanding Young People's Experiences of Cybersecurity., , , and . EuroUSEC, page 200-210. ACM, (2021)Planning in-hand dexterous micro-manipulation using 3-D rotations decomposition., , and . CASE, page 2085-2091. IEEE, (2021)Image Security Using Cellular Automata Rules., , , and . SocProS (1), volume 258 of Advances in Intelligent Systems and Computing, page 403-412. Springer, (2013)Secure and Efficient Automatic Ruling in Three-Level Network Architecture., , , , , and . ICT Innovations, volume 399 of Advances in Intelligent Systems and Computing, page 185-194. Springer, (2015)Learner-content interaction in e-learning- the moderating role of perceived harm of COVID-19 in assessing the satisfaction of learners., , and . Smart Learn. Environ., 8 (1): 5 (2021)Cloud resource mapping through crow search inspired metaheuristic load balancing technique., , and . Comput. Electr. Eng., (2021)