Author of the publication

Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN).

, , , , , and . CoRR, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications., , , , , , , and . IEEE Trans. Veh. Technol., 70 (2): 1474-1479 (2021)A novel routing optimization strategy based on reinforcement learning in perception layer networks., , , , , and . Comput. Networks, (December 2023)Social Phenomena and Fog Computing Networks: A Novel Perspective for Future Networks., , , , , and . IEEE Trans. Comput. Soc. Syst., 9 (1): 32-44 (2022)Water Preservation in Soan River Basin using Deep Learning Techniques., , , , , , , and . CoRR, (2019)Optimization of CNN through Novel Training Strategy for Visual Classification Problems., , , , , and . Entropy, 20 (4): 290 (2018)Tracking area list allocation scheme based on overlapping community algorithm., , , , , , , and . Comput. Networks, (2020)Deep Learning Techniques for Future Intelligent Cross-Media Retrieval., , , , , , , and . CoRR, (2020)FHC-PCIA: A Physical Cell Identification Allocation Method Based on Fuzzy Hierarchical Clustering for Heterogeneous Cellular Network., , , , , and . IEEE Access, (2018)A Hybrid Deep CNN Model for Abnormal Arrhythmia Detection Based on Cardiac ECG Signal., , , , , and . Sensors, 21 (3): 951 (2021)An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks., , , , , , , , and . Sensors, 21 (2): 446 (2021)