Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cluster Head Selection Heuristic Using Weight and Rank in WSN., , and . Trans. Comput. Sci., (2015)Secure pay while on move toll collection using VANET., and . Comput. Stand. Interfaces, 36 (2): 403-411 (2014)Maximising anonymity of a vehicle., and . Int. J. Auton. Adapt. Commun. Syst., 3 (2): 198-216 (2010)Zero Knowledge based Authentication for Internet of Medical Things., , and . ICCCNT, page 1-6. IEEE, (2023)Correction: Optimized Machine Learning for Classifying Colorectal Tissues., , , and . SN Comput. Sci., 4 (5): 535 (September 2023)Privacy preserving mutual authentication in WiMAX., and . Int. J. Inf. Technol. Commun. Convergence, 2 (4): 308-320 (2013)Profile based Mobility Model for Vehicular ad- hoc Networks., , , and . NaBIC, page 493-498. IEEE, (2009)Intrusion Detection for Internet of Vehicles using Machine Learning., , and . ICCCNT, page 1-6. IEEE, (2023)Infrastructure Aided Privacy Preserving-Authentication in VANETs., , and . ISA, volume 76 of Communications in Computer and Information Science, page 179-189. Springer, (2010)Secure toll collection in VANETs., and . Int. J. Inf. Technol. Commun. Convergence, 1 (4): 421-443 (2011)