Author of the publication

Decentralized Group Authentication of Devices Based on PhysicallyUnclonable Functions Using OneM2MArchitecture.

, , , and . ICCCNT, page 1-6. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Insight into the Requirements of Self-aware, Adaptive and Reliable Embedded Sub-systems of Satellite Spacecraft., , , , , , and . PECCS, page 603-608. SciTePress, (2011)AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique., , and . Expert Syst. Appl., (2018)Quality Enhancement of Recommendation using Improved Triangle Ratings., , , , , and . Int. J. Perform. Eng., 19 (2): 105 (2023)High-order finite-difference entropy stable schemes for two-fluid relativistic plasma flow equations., , and . J. Comput. Phys., (September 2023)Techniques, Tricks and Algorithms for Efficient GPU-Based Processing of Higher Order Hyperbolic PDEs., , , and . CoRR, (2022)Sampling Based Approaches to Handle Imbalances in Network Traffic Dataset for Machine Learning Techniques., , and . CoRR, (2013)Target-DBPPred: An intelligent model for prediction of DNA-binding proteins using discrete wavelet transform based compression and light eXtreme gradient boosting., , , , , and . Comput. Biol. Medicine, (2022)$BC_DCN$: a new edge centrality measure to identify and rank critical edges pertaining to SIR diffusion in complex networks., , , , and . Soc. Netw. Anal. Min., 12 (1): 49 (2022)Modelling and simulation of an analytical approach to handle real-time traffic in VoIP network., , , , , and . IJSPM, 13 (1): 35-42 (2018)A Step Towards Empowerment and Digital Inclusion of Rural Public in India., , and . ICEGOV, page 375-383. ACM, (2017)