Author of the publication

Enhancing security of electronic health records through grid-based user authentication scheme.

, , and . Int. J. Inf. Commun. Technol., 6 (2): 109-121 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks., , and . J. Inf. Secur. Appl., (2019)Support vector machine-based proactive fault-tolerant scheduling for grid computing environment., , and . Int. J. Adv. Intell. Paradigms, 16 (3/4): 381-403 (2020)EDIS: an effective method for detection and isolation of sinkhole attacks in mobile ad hoc networks., , , and . Int. J. Wirel. Mob. Comput., 11 (3): 171-181 (2016)Intelligent phishing url detection using association rule mining., and . HCIS, (2016)Ontology Based Resource Allocation (OBRA) for Adaptive Intelligent Grid Environment., , and . UCAmI, volume 7656 of Lecture Notes in Computer Science, page 330-333. Springer, (2012)An autonomous moving heuristic for mobile sink based on feasible sojourn regions to maximise network lifetime in wireless sensor networks., and . Int. J. Inf. Technol. Commun. Convergence, 3 (1): 65-86 (2014)Stability analysis of analytical hierarchy process clustering protocol in mobile ad hoc networks., and . Int. J. Commun. Networks Distributed Syst., 4 (4): 407-435 (2010)Special Section on Big Data and Cloud Technologies., , and . Comput. Electr. Eng., (2019)Trust aware nature inspired optimised routing in clustered wireless sensor networks., , , , and . Int. J. Bio Inspired Comput., 14 (2): 103-113 (2019)A novel fault tolerant service selection framework for pervasive computing., , and . Hum. centric Comput. Inf. Sci., (2012)