Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Efficient Distance Studies: Online Course Management System (CMS)., , and . HCI (35), volume 12796 of Lecture Notes in Computer Science, page 113-125. Springer, (2021)An Efficient Game Theory-Based Power Control Algorithm for D2D Communication in 5G Networks., , , , , , and . KSII Trans. Internet Inf. Syst., 15 (7): 2631-2649 (2021)Arabic light-based stemmer using new rules., , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (9): 6635-6642 (2022)Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks., , , , and . EURASIP J. Wirel. Commun. Netw., 2020 (1): 105 (2020)An Efficient Game Theory-Based Power Control Algorithm for D2D Communication in 5G Networks., , , , , , and . CoRR, (2023)On the authentication and re-authentication protocols in LTE-WLAN interworking architecture., , , , and . Trans. Emerg. Telecommun. Technol., (2017)Normalized Advancement Based Totally Opportunistic Routing Algorithm With Void Detection and Avoiding Mechanism for Underwater Wireless Sensor Network., , , , and . IEEE Access, (2020)Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN)., , , and . Sensors, 20 (8): 2283 (2020)Authentication process enhancements in WiMAX networks., , , , and . Secur. Commun. Networks, 9 (17): 4703-4725 (2016)Dynamic Job Scheduling Strategy Using Jobs Characteristics in Cloud Computing., , , , and . Symmetry, 12 (10): 1638 (2020)