Author of the publication

A secure cloud storage system combining time-based one-time password and automatic blocker protocol.

, , and . EURASIP J. Inf. Secur., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An effective approach for authentication of mobile users., , and . VTC Spring, page 598-601. IEEE, (2002)A novel deep autoencoder based survival analysis approach for microarray dataset., , , and . PeerJ Comput. Sci., (2021)An efficient multi-factor authentication scheme based CNNs for securing ATMs over cognitive-IoT., , , and . PeerJ Comput. Sci., (2021)Enhancing the Image Transmission over Wireless Networks through a Novel Interleaver., , , , , , and . KSII Trans. Internet Inf. Syst., 5 (9): 1528-1543 (2011)Intelligence Is beyond Learning: A Context-Aware Artificial Intelligent System for Video Understanding., , , and . Comput. Intell. Neurosci., (2020)Homomorphic image watermarking with a singular value decomposition algorithm., , , , , , , , , and . Inf. Process. Manag., 50 (6): 909-923 (2014)An SVD audio watermarking approach using chaotic encrypted images., , , , , , , , , and 1 other author(s). Digit. Signal Process., 21 (6): 764-779 (2011)Efficient machine learning model for predicting drug-target interactions with case study for Covid-19., , , and . Comput. Biol. Chem., (2021)Buffering_Slotted_ALOHA protocol for underwater acoustic sensor networks based on the slot status., , , , and . Wirel. Networks, 27 (5): 3127-3145 (2021)Quality of service investigation for multimedia transmission over UWB networks., , and . COMSWARE, page 188-191. IEEE, (2008)