Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Pseudonym Changing Scheme for Location Privacy Preservation in Sparse Traffic Areas., , , , , and . IEEE Access, (2023)Collaborative learning using tabletop and interactive whiteboard systems., , , , , and . Int. J. Bus. Inf. Syst., 20 (3): 382-395 (2015)SMMAG: SNMP-Based MPLS-TE Management Using Mobile Agents., , and . ACC (2), volume 191 of Communications in Computer and Information Science, page 471-479. Springer, (2011)Sink mobility aware energy-efficient network integrated super heterogeneous protocol for WSNs., , , , , and . EURASIP J. Wirel. Commun. Netw., (2016)The role of big data analytics in Internet of Things., , , , , , and . Comput. Networks, (2017)Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home., , , , and . Digit. Commun. Networks, 9 (2): 383-392 (April 2023)RiceChain: secure and traceable rice supply chain framework using blockchain technology., , , , and . PeerJ Comput. Sci., (2022)WSN-Based Fire Detection and Escape System with Multi-modal Feedback., , , and . MCSS, volume 149 of Communications in Computer and Information Science, page 251-260. Springer, (2011)Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation., , , and . TrustCom/BigDataSE/ISPA (1), page 718-725. IEEE, (2015)T-Smart: Trust Model for Blockchain Based Smart Marketplace., , , , and . J. Theor. Appl. Electron. Commer. Res., 16 (6): 2405-2423 (2021)