Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SDAFPS: Secure Data Aggregation using Fuzzy Judgement, Pattern Category and SHAP Contribution., , and . SN Comput. Sci., 2 (2): 86 (2021)VEDSDA: Voronoi Encryption and Decryption for Secure Data Aggregation in WSNs., , and . Wirel. Pers. Commun., 119 (3): 2675-2694 (2021)Base-station controlled clustering scheme in wireless sensor networks., , , , , and . Wireless Days, page 1-5. IEEE, (2008)Implementation of Public Key Crypto Processor with Probabilistic Encryption on FPGA for Nodes in Wireless Sensor Networks., , and . ICCCNT, page 1-6. IEEE, (2018)Cross Layer Design for Wi-Fi Sensor Network Handling Static and Dynamic Environment Using Local Automate Based Autonomic Network Architecture., , and . SN Comput. Sci., 2 (3): 232 (2021)Minimal Block Knight's Tour and Edge with LSB Pixel Replacement Based Encrypted Image Steganography., , and . SN Comput. Sci., 2 (3): 139 (May 2021)Designing WiMAX Static Environment using Local Automata based Autonomic Network Architecture for Wireless Sensor Networks., , and . ANT/EDI40, volume 184 of Procedia Computer Science, page 947-952. Elsevier, (2021)QoS group based optimal retransmission medium access protocol for wireless sensor networks., , , , , and . CoRR, (2014)KCSR: Keymatches Constrained Secure Routing in Heterogeneous Wireless Sensor Networks., , , , , and . ICEIS (4), page 13-22. SciTePress, (2011)Mobile node authentication using key distribution scheme in wireless sensor networks., , , and . Int. J. Ad Hoc Ubiquitous Comput., 12 (1): 34-45 (2013)