Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Review on Security of Internet of Things Authentication Mechanism, , , , , , , , and . IEEE Access, (2019)A Frictionless and Secure User Authentication in Web-Based Premium Applications., , , , and . IEEE Access, (2021)An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks., , , , , , , and . Ad Hoc Sens. Wirel. Networks, 46 (1-2): 83-112 (2020)Soft-Computing Methodologies for Precipitation Estimation: A Case Study., , , , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 8 (3): 1353-1358 (2015)MIRASS: Medical Informatics Research Activity Support System Using Information Mashup Network., , , , and . J. Medical Syst., 38 (4): 37 (2014)An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1., , , and . J. Medical Syst., 37 (5): 9971 (2013)A review of smart home applications based on Internet of Things., , , , and . J. Netw. Comput. Appl., (2017)A security framework for mHealth apps on Android platform., , , , , , , and . Comput. Secur., (2018)A systematic literature review on advanced persistent threat behaviors and its detection strategy., , , and . J. Cybersecur., (January 2024)Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records., , , and . FGCT, page 93-97. IEEE, (2013)