Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An adaptive mutual trust based access control model for electronic healthcare system., and . J. Ambient Intell. Humaniz. Comput., 11 (5): 2117-2136 (2020)An Image Security Model Based on Chaos and DNA Cryptography for IIoT Images., , and . IEEE Trans. Ind. Informatics, 19 (2): 1957-1964 (2023)A Multifactor Ring Signature based Authentication Scheme for Quality Assessment of IoMT Environment in COVID-19 Scenario., , , and . ACM J. Data Inf. Qual., 15 (2): 23:1-23:24 (June 2023)Proposal and analysis of relative stability in mixed CNT bundle for sub-threshold interconnects., , and . Integr., (2021)Trust management in online computing environment: a complete review., and . J. Ambient Intell. Humaniz. Comput., 15 (1): 491-545 (January 2024)DPPT : A differential privacy preservation technique for cyber-physical system., , and . Comput. Electr. Eng., 109 (Part A): 108661 (July 2023)FigCaps-HF: A Figure-to-Caption Generative Framework and Benchmark with Human Feedback., , , , , , , , and . CoRR, (2023)Edge computing based secure health monitoring framework for electronic healthcare system., and . Clust. Comput., 26 (2): 1205-1220 (April 2023)Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine., , , and . Clust. Comput., 26 (2): 1035-1051 (April 2023)TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms., , , and . Clust. Comput., 26 (2): 1461-1477 (April 2023)