Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Charging Schedules for WRSNs: A Multi-Criteria Decision-Making Approach with Multiple Charger Vehicles., , , , , , , and . ICM, page 239-242. IEEE, (2023)Recent Advances and Trends in Lightweight Cryptography for IoT Security., , and . CNSM, page 1-5. IEEE, (2020)A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network., , , and . WF-IoT, page 1-6. IEEE, (2020)Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node., , , and . SmartIoT, page 189-196. IEEE, (2019)VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography., , , , , and . ATSIP, page 376-381. IEEE, (2024)Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme., , , , , , , and . Wirel. Pers. Commun., 125 (1): 513-530 (2022)PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism., , , and . ICVISP, page 58:1-58:8. ACM, (2020)(POSTER) Resolving the Decreased Rank Attack in RPL's IoT Networks., , , , , and . DCOSS-IoT, page 65-67. IEEE, (2023)Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT., , , and . CoRR, (2021)PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms., , , , , and . CAMAD, page 188-193. IEEE, (2023)