Author of the publication

Dynamic Access Control and Trust Management for Blockchain-Empowered IoT.

, , , , and . IEEE Internet Things J., 9 (15): 12997-13009 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HA-A2L: angle to landmark-based high accuracy localization method in sensor networks., , and . IWCMC, page 475-480. ACM, (2007)Energy and mobility aware clustering technique for multicast routing protocols in wireless ad hoc networks., , and . WCNC, page 2150-2155. IEEE, (2009)Optimal mobile beacon trajectories for nodes localisation in wireless sensor networks., , , and . Int. J. Ad Hoc Ubiquitous Comput., 29 (1/2): 64-76 (2018)Emergency Networks and Future Public Safety Systems., , and . Wirel. Commun. Mob. Comput., (2019)Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC., and . Wirel. Commun. Mob. Comput., 9 (4): 469-488 (2009)Protocol Validation: A Parallel Technique to Reduce the Reachability Tree.. PARLE, volume 817 of Lecture Notes in Computer Science, page 109-121. Springer, (1994)A2L: Angle to Landmarks Based Method Positioning for Wireless Sensor Networks., , and . ICC, page 3301-3306. IEEE, (2007)On semantic clustering and adaptive robust regression based energy-aware communication with true outliers detection in WSN., , , and . Ad Hoc Networks, (2019)A Secure and Efficient Wireless Charging Scheme for Electric Vehicles in Vehicular Energy Networks., , , , and . IEEE Trans. Veh. Technol., 71 (2): 1491-1508 (2022)Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game., , , , and . IEEE Trans. Veh. Technol., 71 (10): 11089-11102 (2022)