Author of the publication

Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities.

, , , , , , , and . Sensors, 22 (8): 2908 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks., , and . Comput. Syst. Sci. Eng., (2008)A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card.. IET Inf. Secur., 7 (1): 3-10 (2013)A Novel Frequency Billing Service in Digital Television System., , and . J. Inf. Hiding Multim. Signal Process., 5 (3): 439-450 (2014)A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps., , , , and . Soft Comput., 22 (8): 2495-2506 (2018)Time-bound key-aggregate encryption for cloud storage., , , and . Secur. Commun. Networks, 9 (13): 2059-2069 (2016)Security enhancement on an RFID ownership transfer protocol based on cloud., , , , and . Future Gener. Comput. Syst., (2019)A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services., , , and . Inf. Technol. Control., 45 (3): 289-299 (2016)On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment., , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 241-248. Springer, (2017)Robot Identification and Authentication in a Robot Cloud Service System., , , and . IEEE Access, (2018)A dynamic identity-based user authentication scheme for remote login systems., , and . Secur. Commun. Networks, 8 (18): 3372-3382 (2015)