Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced three-factor security protocol for consumer USB mass storage devices., , , and . IEEE Trans. Consumer Electronics, 60 (1): 30-37 (2014)Computing Shortest Paths in the Plane with Removable Obstacles., , , and . SWAT, volume 101 of LIPIcs, page 5:1-5:15. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)LOADS: Load Optimization and Anomaly Detection Scheme for Software-Defined Networks., and . IEEE Trans. Vehicular Technology, 68 (12): 12329-12344 (2019)A systematic review on routing protocols for Vehicular Ad Hoc Networks., , and . Veh. Commun., 1 (1): 33-52 (2014)Towards energy-aware fog-enabled cloud of things for healthcare., , , , , and . Comput. Electr. Eng., (2018)Mobile cloud networking for efficient energy management in smart grid cyber-physical systems., , and . IEEE Wirel. Commun., 23 (5): 100-108 (2016)Energy trading with dynamic pricing for electric vehicles in a smart city environment., , , and . J. Parallel Distributed Comput., (2019)Efficient provably secure password-based explicit authenticated key agreement., , , and . Pervasive Mob. Comput., (2015)Exploring Cell counting with Neural Arithmetic Logic Units., , , , and . CoRR, (2020)Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (2): 391-406 (2020)