Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi-records datasets., , , , and . Trans. Emerg. Telecommun. Technol., (2021)A Context-Aware Information-Based Clone Node Attack Detection Scheme in Internet of Things., , , , and . CoRR, (2021)Energy optimization and Performance Analysis of Cluster Based Routing Protocols Extended from LEACH for WSNs., , , , , , , , , and . CoRR, (2013)Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks., , , , and . Future Gener. Comput. Syst., (2018)τ-safety: A privacy model for sequential publication with arbitrary updates., , , , , , , , and . Comput. Secur., (2017)CLUSMA: a mobile agent based clustering middleware for wireless sensor networks., , , , and . FIT, page 63:1-63:4. ACM, (2009)Sink-to-Sink Coordination Framework Using RPL: Routing Protocol for Low Power and Lossy Networks., , , , and . J. Sensors, (2016)MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus., , , , and . CoRR, (2020)Towards ontology-based multilingual URL filtering: A big data problem, , , , , , , , and . The Journal of Supercomputing, 74 (10): 5003--5021 (2018)Toward Smart Manufacturing Using Spiral Digital Twin Framework and Twinchain., , , , and . IEEE Trans. Ind. Informatics, 18 (2): 1359-1366 (2022)