Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Lightweight Hardware-Assisted Charging Coordination Authentication Framework for Trusted Smart Grid Energy Storage Units., and . SN Comput. Sci., 2 (6): 444 (2021)Analysis of Sentimental Behaviour over Social Data Using Machine Learning Algorithms., , , , , and . IEA/AIE (1), volume 12798 of Lecture Notes in Computer Science, page 396-412. Springer, (2021)A comprehensive review on blockchains for Internet of Vehicles: Challenges and directions., , , , , , and . Comput. Sci. Rev., (May 2023)Enhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-Assisted Security., , , , , , , and . IEEE Access, (2021)Benchmarking for Hardware Security: Types, Design Levels, and Limitations., , and . MWSCAS, page 1088-1092. IEEE, (2023)Power reduction for Smart Homes in an Internet of Things framework., , , , , and . EIT, page 117-121. IEEE, (2016)Efficient allocation of slot using Medium Access Control protocol., , , , and . EIT, page 105-110. IEEE, (2016)A Secure Hardware-Assisted AMI Authentication Scheme for Smart Cities., and . IEEE Consumer Electron. Mag., 10 (4): 106-112 (2021)A blockchain-enabled framework for securing connected consumer electronics against wireless attacks., , , , , and . Simul. Model. Pract. Theory, (2022)Automatic Tampering Detection Paradigm to Support Personal Health Record., , , , , and . CHASE, page 388-393. IEEE Computer Society, (2016)