Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Logical Tree Based Secure Rekeying Management for Smart Devices Groups in IoT Enabled WSN., , , , , and . IEEE Access, (2019)Sustainable development challenges in libraries: A systematic literature review (2000--2020), , and . The Journal of Academic Librarianship, 47 (3): 102347 (2021)Going green libraries; Sustainable development challenges; Sustainable development libraries; Sustainable literature reviews.Provably secure biometric-based client-server secure communication over unreliable networks., , , , and . J. Inf. Secur. Appl., (2021)Classical versus reinforcement learning algorithms for unmanned aerial vehicle network communication and coverage path planning: A systematic literature review., , , , and . Int. J. Commun. Syst., (2023)An improved lightweight multiserver authentication scheme., , , , , and . Int. J. Commun. Syst., (2017)A zero watermarking approach for content authentication and tampering detection of Arabic text based on fourth level order and word mechanism of Markov model., , and . J. Inf. Secur. Appl., (2020)An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF., , , , , , and . Internet Things, (July 2023)Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF., , , , , and . IEEE Trans. Veh. Technol., 70 (11): 12158-12167 (2021)APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System., , , , , , and . IEEE Access, (2023)Blockchain-Assisted Secure Smart Home Network Using Gradient-Based Optimizer With Hybrid Deep Learning Model., , , , , and . IEEE Access, (2023)