Author of the publication

Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges

, , , , and . International Journal of Communication Systems, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices., , , and . Int. J. Autom. Comput., 13 (4): 350-363 (2016)Internet of Intelligent Vehicles (IoIV): An Intelligent VANET Based Computing via Predictive Modeling., , and . IEEE Access, (2023)Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles., , , , , and . IEEE Access, (2021)Comparative Analysis of State-of-the-Art Deep Learning Models for Detecting COVID-19 Lung Infection from Chest X-Ray Images., , , , , , , and . CoRR, (2022)Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs., , , , and . Sensors, 21 (8): 2718 (2021)Software Defined Network (SDN) Based Internet of Things (IoT): A Road Ahead., , , and . ICFNDS, page 15:1-15:8. ACM, (2017)Complex Adaptive Systems: A Data Modelling and Engineering Perspective., , , and . ICISDM, page 44-48. ACM, (2018)The framework for efficient passphrase-based multifactor authentication in cloud computing., , and . ICAC, page 37-41. IEEE, (2016)A Novel Model for HD video calling in 5G Networks., , , , and . ICAC, page 1-6. IEEE, (2019)DDoS in IoT: A Roadmap Towards Security & Countermeasures., , and . ICAC, page 1-6. IEEE, (2019)