Author of the publication

From information seeking to information avoidance: Understanding the health information behavior during a global health crisis.

, , , , and . Inf. Process. Manag., 58 (2): 102440 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Logical Tree Based Secure Rekeying Management for Smart Devices Groups in IoT Enabled WSN., , , , , and . IEEE Access, (2019)A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things., , , , and . Int. J. Commun. Syst., (2020)Competencies needed for future academic librarians in Pakistan.. Educ. Inf., 20 (1): 27-43 (2002)Librarians' opinions about library software: a survey of libraries in Lahore., and . Electron. Libr., 25 (6): 766-777 (2007)The changing role of librarians in the digital world: Adoption of Web 2.0 technologies by Pakistani librarians., and . Electron. Libr., 30 (4): 469-479 (2012)Sustainable development challenges in libraries: A systematic literature review (2000--2020), , and . The Journal of Academic Librarianship, 47 (3): 102347 (2021)Going green libraries; Sustainable development challenges; Sustainable development libraries; Sustainable literature reviews.Protein Folding Database (PFD 2.0): an online environment for the International Foldeomics Consortium., , , , , and . Nucleic Acids Res., 35 (Database-Issue): 304-307 (2007)Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF., , , , , and . IEEE Trans. Veh. Technol., 70 (11): 12158-12167 (2021)An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF., , , , , , and . Internet Things, (July 2023)Provably secure biometric-based client-server secure communication over unreliable networks., , , , and . J. Inf. Secur. Appl., (2021)