Author of the publication

Intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era.

, and . Comput. Networks, (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing three-party authentication and key agreement protocol for real time IP multimedia server-client systems., , , and . Multimedia Tools Appl., 75 (10): 5795-5817 (2016)A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems., , and . Sensors, 19 (18): 3821 (2019)Digital-twin assisted: Fault diagnosis using deep transfer learning for machining tool condition., and . Int. J. Intell. Syst., 37 (12): 10289-10316 (December 2022)Dynamic-Driven Congestion Control and Segment Rerouting in the 6G-Enabled Data Networks., , and . IEEE Trans. Ind. Informatics, 17 (10): 7165-7173 (2021)A smart lightweight privacy preservation scheme for IoT-based UAV communication systems., and . Comput. Commun., (2020)Energy Aware Resource Allocation in Multi-Hop Multimedia Routing via the Smart Edge Device., , and . IEEE Access, (2019)A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions., and . Ad Hoc Networks, (2023)A Proxy-Authorized Public Auditing Scheme for Cyber-Medical Systems Using AI-IoT., and . IEEE Trans. Ind. Informatics, 18 (8): 5371-5382 (2022)A Cloud-Assisted Medical Cyber-Physical System Using a Privacy-Preserving Key Agreement Framework and a Chebyshev Chaotic Map., and . IEEE Syst. J., 17 (4): 5543-5554 (December 2023)Seamless secure anonymous authentication for cloud-based mobile edge computing., , and . Comput. Electr. Eng., (2020)