Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networks., , , and . IJDSN, (2018)Multi-antenna channel capacity enhancement in wireless communication., , , and . ICUFN, page 77-82. IEEE, (2015)A Subject-Centric Credential Management Method based on the Verifiable Credentials., , , and . ICOIN, page 508-510. IEEE, (2021)Vulnerability Analysis of DID Document's Updating Process in the Decentralized Identifier Systems., , , and . ICOIN, page 517-520. IEEE, (2021)Blockchain-Based Management of Video Surveillance Systems., , and . ICOIN, page 465-468. IEEE, (2019)Proof-of-Lottery: Design for Block Producing Algorithm Based on PoS for Scalability., , , and . ICOIN, page 666-669. IEEE, (2020)Scenario and countermeasure for replay attack using join request messages in LoRaWAN., , , and . ICOIN, page 718-720. IEEE, (2017)Escalator: An Autonomous Scheduling Scheme for Convergecast in TSCH., , , and . Sensors, 18 (4): 1209 (2018)A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain., , and . ICUFN, page 817-819. IEEE, (2018)Reducing positioning errors in the important access point selection method for fingerprint localization by spatial partitioning., , , and . ICOIN, page 445-447. IEEE, (2017)