Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities., , , , and . J. Parallel Distributed Comput., (2019)A lightweight authentication scheme for vehicular ad hoc networks based on MSR., , , , , , , and . Veh. Commun., (2019)Secure Data Analytics for Cloud-Integrated Internet of Things Applications., , , , and . IEEE Cloud Comput., 3 (2): 46-56 (2016)ECG compression technique using fast fractals in the Internet of medical things., , , and . Concurr. Comput. Pract. Exp., (2023)Multi-objective optimisation for selective packet discarding in wireless sensor network., , and . IET Wirel. Sens. Syst., 5 (3): 124-136 (2015)Real-time Secure Health Surveillance for Smarter Health Communities., , , and . IEEE Commun. Mag., 57 (1): 122-129 (2019)Turbo-coded HARQ scheme in multi-hop cooperative wireless networks., and . WMNC, page 1-4. IEEE, (2013)Gaussian Approximation-Based Lossless Compression of Smart Meter Readings., , and . IEEE Trans. Smart Grid, 9 (5): 5047-5056 (2018)Multi-Binomial mixes: A proposal for secure and efficient anonymous communication., and . Comput. Networks, (2015)A Practical Privacy-Preserving Recommender System., , and . Data Sci. Eng., 1 (3): 161-177 (2016)