Author of the publication

Security paradigm for remote health monitoring edge devices in internet of things.

, , , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (6): 101478 (June 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight Blockchain-Enhanced Mutual Authentication Protocol for UAVs., , , , , and . IEEE Internet Things J., 11 (6): 9547-9557 (March 2024)Extending inner-ear anatomical concepts in the Foundational Model of Anatomy (FMA) ontology., , , , , , and . BIBE, page 1-6. IEEE Computer Society, (2015)A Linked Data Visualiser for Finite Element Biosimulations., , , , , , and . ICSC, page 307-313. IEEE Computer Society, (2016)Towards Co-Located TSCH Networks: An Inter-Network Interference Perspective., , , and . GLOBECOM, page 1-6. IEEE, (2018)Security paradigm for remote health monitoring edge devices in internet of things., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (6): 101478 (June 2023)Medium Access Control protocols for reliable communication in low-power industrial applications.. Otto-von-Guericke University Magdeburg, Germany, (2020)Dual-Mode Time-Slotted (DMTS) MAC Protocol for Industrial Control Applications., , , , and . GLOBECOM Workshops, page 1-6. IEEE, (2018)Demonstrating a Linked Data Visualiser for Finite Element Biosimulations., , , , , , and . ICSC, page 174-175. IEEE Computer Society, (2016)Service Migrations in TSCH Network using Wireless Channel Estimation and Prediction., , , , and . GI-Jahrestagung, volume P-307 of LNI, page 1257-1266. GI, (2020)A Reliability Analysis of TSCH Protocol in a Mobile Scenario., , , and . CCNC, page 1-6. IEEE, (2019)