Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks., , , , , , and . IEEE J. Biomed. Health Informatics, 21 (3): 655-663 (2017)A mutual exclusion algorithm for flying Ad Hoc networks., , , , , , and . Comput. Electr. Eng., (2019)On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications., , , , , , and . HealthCom, page 205-210. IEEE, (2015)Finding Healthcare Issues with Search Engine Queries and Social Network Data., , , , , and . Int. J. Semantic Web Inf. Syst., 13 (1): 48-62 (2017)Subjective logic-based trust model for fog computing., , , and . Comput. Commun., (2021)Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment., , , , and . Health Informatics J., (2019)Assessing Routing Strategies for Cognitive Radio Sensor Networks., , , and . Sensors, 13 (10): 13005-13038 (2013)Enhanced Ant Colony algorithm for self-optimized data assured routing in wireless sensor networks., and . ICON, page 422-427. IEEE, (2012)Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry., , , , , , and . IEEE Access, (2018)Handheld Device-Based Indoor Localization with Zero Infrastructure (HDIZI)., , , , and . Sensors, 22 (17): 6513 (2022)