Author of the publication

An algorithm for determining data forwarding strategy based on recommended trust value in MANET.

, , , , , , and . Int. J. Embed. Syst., 12 (4): 544-553 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tissue Recognition in Spinal Endoscopic Surgery Using Deep Learning., , , , , , , and . iCAST, page 1-5. IEEE, (2019)A distributed data secure transmission scheme in wireless sensor network., , , and . Int. J. Distributed Sens. Networks, (2017)Deep Neural Network Security Collaborative Filtering Scheme for Service Recommendation in Intelligent Cyber-Physical Systems., , , , , , and . IEEE Internet Things J., 9 (22): 22123-22132 (2022)A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles., , , , and . Comput. Electr. Eng., (2021)An Anonymous Mutual Authentication and Key Agreement Scheme in WBAN., , , and . BigDataSecurity/HPSC/IDS, page 31-36. IEEE, (2019)A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol., , , , , and . Sensors, 20 (17): 4835 (2020)A User-Oriented Special Topic Generation System for Digital Newspaper., , , , and . NLPCC, volume 9362 of Lecture Notes in Computer Science, page 484-491. Springer, (2015)A Terminal Device Authentication Scheme Based on Blockchain Technology in WBAN., , , and . CSCloud/EdgeCom, page 411-416. IEEE, (2023)Sentences Extraction from Digital Publication for Domain-Specific Knowledge Service., , , and . HCI (26), volume 434 of Communications in Computer and Information Science, page 274-279. Springer, (2014)Personal Identification by Convolutional Neural Network with ECG Signal., , , and . ICTC, page 559-563. IEEE, (2018)