Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Gadget-Free Digital Services., , , , , and . Computer, 51 (11): 66-77 (2018)Different I/O Standard and Technology Based Thermal Aware Energy Efficient Vedic Multiplier Design for Green Wireless Communication on FPGA., , , and . Wirel. Pers. Commun., 96 (2): 3139-3158 (2017)CTHS Based Energy Efficient Thermal Aware Image ALU Design on FPGA., , , and . Wirel. Pers. Commun., 85 (3): 671-696 (2015)SEC-BlockEdge: Security Threats in Blockchain-Edge based Industrial IoT Networks., , , , , and . RNDM, page 1-7. IEEE, (2019)An Overview of the Security Landscape of Virtual Mobile Networks., , , , , , and . IEEE Access, (2021)Blockchain for Unmanned Underwater Drones: Research Issues, Challenges, Trends and Future Directions., , , , , , , and . CoRR, (2022)Mobile DDR IO Standard Based High Performance Energy Efficient Portable ALU Design on FPGA., , , and . Wirel. Pers. Commun., 76 (3): 569-578 (2014)Reinforcement Learning based Cloud and Edge Resource Allocation for Real-Time Telemedicine., , , , , , and . ISMICT, page 1-6. IEEE, (2023)5G security: Analysis of threats and solutions., , , , , and . CSCN, page 193-199. IEEE, (2017)Security for 5G and Beyond., , , , , and . IEEE Commun. Surv. Tutorials, 21 (4): 3682-3722 (2019)