Author of the publication

Hierarchical Routing Protocols for Wireless Sensor Networks: Functional and Performance Analysis.

, , , , , , and . J. Sensors, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering., , , , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 649-664. Springer, (2015)g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices., , , , , and . IEEE Trans. Consumer Electronics, 65 (2): 215-223 (2019)On the Security of a RSA-based Certificateless Signature Scheme., , and . Int. J. Netw. Secur., 16 (1): 78-80 (2014)Bat algorithm-based beamforming for mmWave massive MIMO systems., , , , , and . Int. J. Commun. Syst., (2020)Design of a user anonymous password authentication scheme without smart card., , , and . Int. J. Commun. Syst., 29 (3): 441-458 (2016)Radiological image retrieval technique using multi-resolution texture and shape features., , , , and . Multim. Tools Appl., 81 (10): 13633-13660 (2022)Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry., , , , , and . IEEE Trans. Ind. Informatics, 18 (11): 8316-8325 (2022)A scene image classification technique for a ubiquitous visual surveillance system., , , , , and . Multim. Tools Appl., 78 (5): 5791-5818 (2019)IEEE Access Special Section Editorial: Mobile Edge Computing and Mobile Cloud Computing: Addressing Heterogeneity and Energy Issues of Compute and Network Resources., , , , , , and . IEEE Access, (2020)A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security., , , , , , and . Wirel. Pers. Commun., 89 (2): 569-597 (2016)