Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Technical Report-IoT Devices Proximity Authentication In Ad Hoc Network Environment., , and . CoRR, (2022)0EI2FA: Zero Effort Indoor Two Factor Authentication., , , and . IIT, page 253-257. IEEE, (2020)Counter-surveillance Technique by Diversifying Transmission Links.. CCWC, page 1046-1050. IEEE, (2023)Secure and Fraud Proof Online Payment System for Credit Cards., , and . UEMCON, page 264-268. IEEE, (2021)Server-Side Distinction of Incoming Traffic Transmission Medium Using Machine Learning., , and . UEMCON, page 482-485. IEEE, (2021)CI2FA: Continuous Indoor Two-factor Authentication Based On Trilateration System., , and . COMSNETS, page 1-5. IEEE, (2021)Securing the Invisible Thread: A Comprehensive Analysis of BLE Tracker Security in Apple AirTags and Samsung SmartTags., , , and . CoRR, (2024)"ChatGPT vs. Student: A Dataset for Source Classification of Computer Science Answers., , and . (April 2023)Implementing Variable Power Transmission Patterns for Authentication Purposes., , and . SAI (3), volume 1230 of Advances in Intelligent Systems and Computing, page 198-203. Springer, (2020)Comparative Analysis of Underwater Positioning and Navigation Systems., , and . UEMCON, page 763-767. IEEE, (2021)