Author of the publication

Trust management in online computing environment: a complete review.

, and . J. Ambient Intell. Humaniz. Comput., 15 (1): 491-545 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HKDS: A Hierarchical Key Distribution Scheme for Wireless Ad Hoc Network., and . Int. J. Netw. Secur., 20 (2): 243-255 (2018)Secure Smart Healthcare Framework Using Lightweight DNA Sequence and Chaos for Mobile-Edge Computing., , , and . IEEE Internet Things J., 10 (6, March 15): 4883-4890 (2023)A lightweight blockchain-based framework for medical cyber-physical system., and . J. Supercomput., 79 (11): 12013-12041 (2023)A lightweight block cipher technique for IoT based E-healthcare system security., , and . Multim. Tools Appl., 81 (30): 43551-43580 (2022)Cloud security issues and challenges: A survey., and . J. Netw. Comput. Appl., (2017)Continuous User Authentication System: A Risk Analysis Based Approach., and . Wireless Personal Communications, 108 (1): 281-295 (2019)Evolution of Hyperelliptic Curve Cryptosystems., and . ICDCIT, volume 5966 of Lecture Notes in Computer Science, page 206-211. Springer, (2010)ITrust: identity and trust based access control model for healthcare system security., and . Multimedia Tools Appl., 78 (19): 28309-28330 (2019)An Improved Authentication Protocol for Wireless Body Sensor Networks Applied in Healthcare Applications.. Wireless Personal Communications, 111 (4): 2605-2623 (2020)HIDM: A Hybrid Intrusion Detection Model for Cloud Based Systems., , and . Wirel. Pers. Commun., 128 (4): 2637-2666 (February 2023)