Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Pseudonym Changing Scheme for Location Privacy Preservation in Sparse Traffic Areas., , , , , and . IEEE Access, (2023)Collaborative learning using tabletop and interactive whiteboard systems., , , , , and . Int. J. Bus. Inf. Syst., 20 (3): 382-395 (2015)SMMAG: SNMP-Based MPLS-TE Management Using Mobile Agents., , and . ACC (2), volume 191 of Communications in Computer and Information Science, page 471-479. Springer, (2011)Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation., , , and . TrustCom/BigDataSE/ISPA (1), page 718-725. IEEE, (2015)T-Smart: Trust Model for Blockchain Based Smart Marketplace., , , , and . J. Theor. Appl. Electron. Commer. Res., 16 (6): 2405-2423 (2021)Cost efficient hybrid techniques for DSM in smart homes., , , , and . Int. J. Ad Hoc Ubiquitous Comput., 33 (2): 90-108 (2020)Implementation and Comparative Analysis of the Fault Attacks on AES., , , and . Int. Arab J. Inf. Technol., 10 (6): 625-634 (2013)Adaptive Trust Update Frequency in MANETs., , , and . ICPADS, page 132-139. IEEE Computer Society, (2015)The role of big data analytics in Internet of Things., , , , , , and . Comput. Networks, (2017)Sink mobility aware energy-efficient network integrated super heterogeneous protocol for WSNs., , , , , and . EURASIP J. Wirel. Commun. Netw., (2016)