Author of the publication

DASSR: A Distributed Authentication Scheme for Secure Routing in Wireless Ad-hoc Networks.

, and . FDSE, volume 10018 of Lecture Notes in Computer Science, page 219-236. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Jadeite: A novel image-behavior-based approach for Java malware detection using deep learning., , , and . Comput. Secur., (2022)Hensel's Compression-Based Dimensionality Reduction Approach for Privacy Protection in Federated Learning., , and . ICNC, page 298-303. IEEE, (2023)Toward An IoT-based Expert System for Heart Disease Diagnosis., , and . MAICS, volume 1964 of CEUR Workshop Proceedings, page 157-164. CEUR-WS.org, (2017)Context-driven Policies Enforcement for Edge-based IoT Data Sharing-as-a-Service., , , and . SCC, page 221-230. IEEE, (2022)A Reliable and Efficient Wireless Sensor Network System for Water Quality Monitoring., and . Intelligent Environments, page 84-91. IEEE, (2017)Leveraging Static Analysis Tools for Improving Usability of Memory Error Sanitization Compilers., , , , , and . QRS, page 323-334. IEEE, (2016)Secure Captchas via Object Segment Collages., , , , and . IEEE Access, (2020)From Verification to Optimizations., , , , and . VMCAI, volume 8931 of Lecture Notes in Computer Science, page 300-317. Springer, (2015)Fog-Enabled IoT Framework for Heart Disease Diagnosis Systems., , , and . J. Mobile Multimedia, 19 (2): 389-418 (2023)P4SINC - An Execution Policy Framework for IoT Services in the Edge., , and . ICIOT, page 137-142. IEEE Computer Society, (2017)