Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards decision support model for ubiquitous agriculture., , and . ICDIM, page 308-313. IEEE, (2013)A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps., , , and . Multim. Tools Appl., 75 (18): 11241-11266 (2016)DM-GKM: A key management scheme for dynamic group based applications., , , , and . Comput. Networks, (2020)Security and Privacy Issues in IoT., , , , and . Int. J. Commun. Networks Inf. Secur., (2016)Sinkhole Attacks in Wireless Sensor Networks: A Survey., , and . Wirel. Pers. Commun., 106 (4): 2291-2313 (2019)A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2., , and . Multim. Tools Appl., 78 (17): 24809-24835 (2019)An innovative technique for image encryption using tri-partite graph and chaotic maps., , and . Multim. Tools Appl., 80 (14): 21979-22005 (2021)A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2., and . Multim. Tools Appl., 78 (2): 2105-2133 (2019)Selective encryption for gray images based on chaos and DNA complementary rules., , , and . Multim. Tools Appl., 74 (13): 4655-4677 (2015)Ontology-based transformation and verification of uml class model., , and . Int. Arab J. Inf. Technol., 17 (5): 758-768 (2020)