Author of the publication

Secure Critical Data Reclamation Scheme for Isolated Clusters in IoT-Enabled WSN.

, , , , , and . IEEE Internet Things J., 9 (4): 2669-2677 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computation of Metric-Based Resolvability of Quartz Without Pendant Nodes., , , , and . IEEE Access, (2021)MADM and assessment of pilot health projects based on spherical fuzzy information., , , and . Neural Comput. Appl., 35 (22): 16619-16632 (August 2023)FoG-Oriented Secure and Lightweight Data Aggregation in IoMT., , , , , , and . IEEE Access, (2021)Secure Healthcare Data Aggregation and Transmission in IoT - A Survey., , , , , and . IEEE Access, (2021)Circumventing sinkhole attack in ad hoc networks., , , , and . Int. J. Wirel. Mob. Comput., 9 (4): 363-369 (2015)A Unified Approach for Extremal General Exponential Multiplicative Zagreb Indices., , , , and . Axioms, 12 (7): 675 (July 2023)A cryptographic data hiding algorithm with high cover text capacity., , , and . Int. J. Electron. Secur. Digit. Forensics, 11 (2): 225-244 (2019)Partition Dimension of Generalized Petersen Graph., , , and . Complex., (2021)A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (5): 2180-2191 (2022)Diagnosis of large-for-gestational-age infants using a semi-supervised feature learned from expert and data., , , , , , and . Multim. Tools Appl., 79 (45-46): 34047-34077 (2020)