Author of the publication

An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology.

, , , and . ICNC, page 769-773. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data., , , , , and . CoRR, (2018)Adaptive cell relay routing protocol for mobile ad hoc networks., and . IEEE Trans. Veh. Technol., 55 (1): 278-285 (2006)CAMA: Class activation mapping disruptive attack for deep neural networks., , , , and . Neurocomputing, (2022)Biometric-based authentication scheme for Implantable Medical Devices during emergency situations., , , , and . Future Gener. Comput. Syst., (2019)Self-protecting networking using dynamic p-cycle construction within link capacity constraint., , , and . Secur. Commun. Networks, 5 (6): 689-708 (2012)AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application., , , , and . ICC, page 1-6. IEEE, (2017)Multi-layer security scheme for implantable medical devices., , , , , , and . Neural Comput. Appl., 32 (9): 4347-4360 (2020)Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation., , , , , , and . IEEE Internet Things J., 8 (12): 9905-9919 (2021)MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain., , , , , and . IEEE Access, (2017)PPLS: a privacy-preserving location-sharing scheme in mobile online social networks., , , , , , and . Sci. China Inf. Sci., (2020)