Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient stego key recovery based on distribution differences of extracting message bits., , , , and . J. Real-Time Image Processing, 16 (3): 649-660 (2019)QoS-aware virtual SDN network planning., , and . IM, page 644-647. IEEE, (2017)A blockchain-based eHealthcare system interoperating with WBANs., , , , , , , and . Future Gener. Comput. Syst., (2020)Using Arithmetic Transform to Calculate Ranges of Arithmetic Datapaths., , , , and . J. Comput., 7 (12): 2906-2912 (2012)Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud., , and . ICPCSEE (2), volume 1452 of Communications in Computer and Information Science, page 129-138. Springer, (2021)Migrating Live Streaming Applications onto Clouds: Challenges and a CloudStorm Solution., , , , , , and . UCC Companion, page 321-326. IEEE, (2018)A Hybrid Chaotic Encryption ASIC With Dynamic Precision for Internet of Things., , , and . IEEE Internet Things J., 11 (1): 1148-1163 (January 2024)An IoT Ecosystem Platform for the Evaluation of Blockchain Feasibility., , , , and . IEEE Internet Things J., 10 (24): 21515-21527 (December 2023)A baseband processing ASIC for body area networks., , , , , , and . J. Ambient Intell. Humaniz. Comput., 10 (10): 3975-3982 (2019)A Hybrid Chaotic Encryption Scheme for Wireless Body Area Networks., , , , , , and . IEEE Access, (2020)