Author of the publication

A Secure IoT-Based Authentication System in Cloud Computing Environment.

, , , , and . Sensors, 20 (19): 5604 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fast multilayer neural-network training algorithm based on the layer-by-layer optimizing procedures., and . IEEE Trans. Neural Networks, 7 (3): 768-775 (1996)Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks., , and . J. Sensors, (2015)Precise CMOS current sample/hold circuits using differential clock feedthrough attenuation techniques., , and . IEEE J. Solid State Circuits, 30 (1): 76-80 (January 1995)High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels., , and . J. Vis. Commun. Image Represent., (2021)A combined optimization method for solving the inverse kinematics problems of mechanical manipulators., and . IEEE Trans. Robotics Autom., 7 (4): 489-499 (1991)Investigation of High-Efficiency Iterative ILU Preconditioner Algorithm for Partial-Differential Equation Systems., , , , , and . Symmetry, 11 (12): 1461 (2019)Object Pose Estimation and Feature Extraction Based on PVNet., , , and . IEEE Access, (2022)Design a dynamic key management protocol for data gathering in wireless sensor network., and . ISIE, page 1-6. IEEE, (2013)10.3 heterogeneous multi-processing quad-core CPU and dual-GPU design for optimal performance, power, and thermal tradeoffs in a 28nm mobile application processor., , , , , , , , , and 18 other author(s). ISSCC, page 180-181. IEEE, (2014)Adaptive Residual Weighted K-Nearest Neighbor Fingerprint Positioning Algorithm Based on Visible Light Communication., , , , and . Sensors, 20 (16): 4432 (2020)