Author of the publication

An efficient service selection framework for pervasive environments.

, , and . Int. J. Wirel. Mob. Comput., 6 (1): 80-90 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel fault tolerant service selection framework for pervasive computing., , and . Hum. centric Comput. Inf. Sci., (2012)A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography., , and . J. King Saud Univ. Comput. Inf. Sci., 33 (1): 86-98 (2021)Centrality Based Congestion Detection Using Reinforcement Learning Approach for Traffic Engineering in Hybrid SDN., , and . J. Netw. Syst. Manag., 30 (1): 2 (2022)An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries., , and . Inf. Comput., (2020)An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks., , and . J. Inf. Secur. Appl., (2019)EDIS: an effective method for detection and isolation of sinkhole attacks in mobile ad hoc networks., , , and . Int. J. Wirel. Mob. Comput., 11 (3): 171-181 (2016)An Improved Coverage Hole Finding System for Critical Applications Based on Computational Geometric Techniques., and . Scalable Comput. Pract. Exp., 25 (1): 557-563 (January 2024)Investigative prototyping a tissue P system for solving distributed task assignment problem in heterogeneous wireless sensor network., , and . J. King Saud Univ. Comput. Inf. Sci., 34 (6 Part B): 3685-3702 (2022)Analysis of hierarchical identity based encryption schemes and its applicability to computing environments., , and . J. Inf. Secur. Appl., (2017)A novel patient friendly IT enabled framework for selection of desired healthcare provider., and . Int. J. Medical Eng. Informatics, 11 (1): 14-40 (2019)