Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reinforcement Learning based Cloud and Edge Resource Allocation for Real-Time Telemedicine., , , , , , and . ISMICT, page 1-6. IEEE, (2023)5G security: Analysis of threats and solutions., , , , , and . CSCN, page 193-199. IEEE, (2017)Securing Gadget-Free Digital Services., , , , , and . Computer, 51 (11): 66-77 (2018)SEC-BlockEdge: Security Threats in Blockchain-Edge based Industrial IoT Networks., , , , , and . RNDM, page 1-7. IEEE, (2019)5G Privacy: Scenarios and Solutions., , , , , and . 5G World Forum, page 197-203. IEEE, (2018)LVTTL based energy efficient watermark generator design and implementation on FPGA., , , , , and . ICTC, page 642-646. IEEE, (2014)Towards gadget-free internet services: A roadmap of the Naked world., , , , , , , , , and . Telematics Informatics, 35 (1): 82-92 (2018)IoTs Enable Active Contour Modeling Based Energy Efficient and Thermal Aware Object Tracking on FPGA., , , , and . Wirel. Pers. Commun., 85 (2): 529-543 (2015)From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges., , , , and . EuCNC, page 1-6. IEEE, (2017)Identity privacy preserving biometric based authentication scheme for Naked healthcare environment., , , and . ICC, page 1-7. IEEE, (2017)