Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Bluetooth Man-In-The-Middle Attack Based On SSP using OOB Association model, , and . CoRR, (2012)A new application of Multi modal Biometrics in home and office security system, , and . CoRR, (2012)Optimizing the Cost for Resource Subscription Policy in IaaS Cloud., and . CoRR, (2014)Security Enhancement in Distributed Networks Using Link-Based Mapping Scheme for Network Intrusion Detection with Enhanced Bloom Filter., and . Wireless Personal Communications, 84 (2): 821-839 (2015)Blockchain-based data deduplication using novel content-defined chunking algorithm in cloud environment., , , and . Int. J. Netw. Manag., (November 2023)Cross Layer QoS Aware Scheduling based on Loss-Based Proportional Fairness with Multihop CRN., , and . Comput. Syst. Sci. Eng., 42 (3): 1063-1077 (2022)A Review on Green Cellular Network. International Journal of Trend in Scientific Research and Development, 2 (5): 342-349 (August 2018)Design of efficient wireless communication system with improved SER using different relay environment., , and . Clust. Comput., 22 (5): 10519-10527 (2019)Enhancing energy utilization for high power node multicasting in wireless sensor networks., and . J. Intell. Fuzzy Syst., 45 (3): 4753-4766 (2023)"They Are Out There, If You Know Where to Look": Mining Transliterations of OOV Query Terms for Cross-Language Information Retrieval., , , and . ECIR, volume 5478 of Lecture Notes in Computer Science, page 437-448. Springer, (2009)