Author of the publication

An Efficient and Secure Authentication Approach in VANET Using Location and Signature-Based Services.

, , , , and . Ad Hoc Sens. Wirel. Networks, 53 (1-2): 59-83 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimization Enabled Deep Learning-Based DDoS Attack Detection in Cloud Computing., , , , , , and . Int. J. Intell. Syst., (2023)Analysis and Pattern Deduction on Linguistic, Numeric Based Mean and Fuzzy Association Rule Algorithm on Any Geo-referenced Crime Point Data Integrated with Google Map., , and . SocProS (2), volume 131 of Advances in Intelligent and Soft Computing, page 15-27. Springer, (2011)An Efficient and Secure Authentication Approach in VANET Using Location and Signature-Based Services., , , , and . Ad Hoc Sens. Wirel. Networks, 53 (1-2): 59-83 (2022)A Simple and Fast Algorithm for the Automatic Localization of Optic Disc in Digital Fundus Retinal Images., , and . IMECS, page 1965-1969. Newswood Limited, (2007)A Novel Integrated Approach Using Dynamic Thresholding and Edge Detection (IDTED) for Automatic Detection of Exudates in Digital Fundus Retinal Images., , and . ICCTA, page 705-710. IEEE Computer Society, (2007)Software defect prediction via optimal trained convolutional neural network., and . Adv. Eng. Softw., (2022)Feature Selection and Dwarf Mongoose Optimization Enabled Deep Learning for Heart Disease Detection, , , , and . Computational Intelligence and Neuroscience, (December 2022)Analysis of Image Compression by Minimum Relative Entropy (MRE) and Restoration through Weighted Region Growing Techniques for Medical Images., , , and . Eng. Lett., 14 (1): 84-89 (2007)