Author of the publication

Secure delegation of services through proxy signature with revocation.

, , and . Int. J. Trust. Manag. Comput. Commun., 3 (4): 291-318 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel Frequency-Domain Oversampling Receiver for CP MC-CDMA Systems., and . IEEE Communications Letters, 19 (4): 661-664 (2015)Ubiquitous Mobility in Next Generation Networks., and . ICON, page 1-5. IEEE, (2006)Network Lifetime Optimization by KKT Optimality Conditions in Wireless Sensor Networks., , , , and . Wireless Personal Communications, 49 (2): 179-196 (2009)A survey and projection on medium access control protocols for wireless sensor networks., , , , and . ACM Comput. Surv., 45 (1): 7:1-7:37 (2012)DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET., , , , and . IEEE Access, (2019)Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning., , and . ITNAC, page 1-6. IEEE, (2019)An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks., , and . ITNAC, page 1-6. IEEE, (2019)DTLShps: SDN-Based DTLS Handshake Protocol Simplification for IoT., , , , and . IEEE Internet of Things Journal, 7 (4): 3349-3362 (2020)A QoS Oriented Vertical Handoff Scheme for WiMAX/WLAN Overlay Networks., and . IEEE Trans. Parallel Distributed Syst., 23 (4): 598-606 (2012)Intelligent Image Recognition System for Marine Fouling Using Softmax Transfer Learning and Deep Convolutional Neural Networks., , , and . Complex., (2017)