Author of the publication

Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things.

, , , and . J. Cyber Secur. Mobil., (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaborative Mutual Identity Establishment (CMIE) for the future internet., , and . Int. J. Pervasive Comput. Commun., 11 (4): 398-417 (2015)Importance of Lightweight Algorithm for Embedded Security in Machine-to-Machine Communication towards Internet of Things., , and . ICIMMI, page 102:1-102:6. ACM, (2022)Intelligent Wildlife Tracking Using Ubiquitous Technological Suite., , , , , and . Int. J. Synth. Emot., 8 (1): 44-59 (2017)Mathematical Representation of Quality of Service (QoS) Parameters for Internet of Things (IoT)., , and . Int. J. Rough Sets Data Anal., 4 (3): 96-107 (2017)Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things., , , and . J. Cyber Secur. Mobil., (2012)A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach., , and . Int. J. Inf. Syst. Model. Des., 9 (1): 92-121 (2018)The hybrid framework of ensemble technique in machine learning for phishing detection., , , , and . Int. J. Inf. Comput. Secur., 21 (1/2): 162-184 (2023)Trust-Based Access Control in Multi-role Environment of Online Social Networks., and . Wirel. Pers. Commun., 100 (2): 391-399 (2018)Word Sense Disambiguation for Large Documents Using Neural Network Model., , and . ICCCNT, page 1-5. IEEE, (2021)Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT)., , and . VITAE, page 1-5. IEEE, (2014)