Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure ECC-based RFID mutual authentication protocol for internet of things., , , and . J. Supercomput., 74 (9): 4281-4294 (2018)A cluster-based key agreement scheme using keyed hashing for Body Area Networks., , , and . Multim. Tools Appl., 66 (2): 201-214 (2013)An Analysis of Public Key Cryptography based Techniques in Wireless Sensor Networks., and . IMECS, page 341-345. Newswood Limited, (2007)DHCP attacking tools: an analysis., , , and . J. Comput. Virol. Hacking Tech., 17 (2): 119-129 (2021)Automated Machine Learning based Elderly Fall Detection Classification., , , and . FNC/MobiSPC/SEIT, volume 203 of Procedia Computer Science, page 16-23. Elsevier, (2022)Snapchat Analysis to Discover Digital Forensic Artifacts on Android Smartphone., and . ANT/SEIT, volume 109 of Procedia Computer Science, page 1035-1040. Elsevier, (2017)An Efficient Multi Recipient Signcryption Scheme Offering Non Repudiation., , and . CIT, page 1577-1581. IEEE Computer Society, (2010)Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks., , , and . MSN, volume 4864 of Lecture Notes in Computer Science, page 737-748. Springer, (2007)Data Structure and Management Protocol to Enhance Name Resolving in Named Data Networking., , , and . Future Internet, 16 (4): 118 (April 2024)Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication., , and . ISA, volume 76 of Communications in Computer and Information Science, page 198-208. Springer, (2010)