Author of the publication

An energy efficient and load balanced sink mobility for wireless sensor networks.

, , and . Int. J. Inf. Commun. Technol., 17 (1): 65-90 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Framework for Incident Handling., , and . Inf. Secur. J. A Glob. Perspect., 22 (1): 1-9 (2013)A survey and classification of XML based attacks on web applications., , and . Inf. Secur. J. A Glob. Perspect., 29 (4): 183-198 (2020)DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications., , , and . Int. J. Inf. Secur. Priv., 14 (4): 57-73 (2020)VSMAS2HN: Verifiably Secure Mutual Authentication Scheme for Smart Healthcare Network., , and . ICACDS, volume 1848 of Communications in Computer and Information Science, page 150-160. Springer, (2023)A Bio-Chaotic Block Cryptosystem for Privacy Protection of Multimedia Data., , and . FICTA, volume 247 of Advances in Intelligent Systems and Computing, page 527-534. Springer, (2013)Energy Efficient Model for Recovery from Multiple Nodes Failure in Wireless Sensor Networks., , and . Wireless Personal Communications, 108 (3): 1459-1479 (2019)Digital Image Authentication Model Based on Edge Adaptive Steganography., and . ADCONS, page 238-242. IEEE, (2013)An energy efficient and load balanced sink mobility for wireless sensor networks., , and . Int. J. Inf. Commun. Technol., 17 (1): 65-90 (2020)Secured biometric template., , and . ICON, page 1-4. IEEE, (2008)PSECAS: A physical unclonable function based secure authentication scheme for Internet of Drones., , , , and . Comput. Electr. Eng., (May 2023)