Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards decision support model for ubiquitous agriculture., , and . ICDIM, page 308-313. IEEE, (2013)A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps., , , and . Multim. Tools Appl., 75 (18): 11241-11266 (2016)A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2., , and . Multim. Tools Appl., 78 (17): 24809-24835 (2019)Sinkhole Attacks in Wireless Sensor Networks: A Survey., , and . Wirel. Pers. Commun., 106 (4): 2291-2313 (2019)Security and Privacy Issues in IoT., , , , and . Int. J. Commun. Networks Inf. Secur., (2016)DM-GKM: A key management scheme for dynamic group based applications., , , , and . Comput. Networks, (2020)A Generic Approach for Wheat Disease Classification and Verification Using Expert Opinion for Knowledge-Based Decisions., , , and . IEEE Access, (2021)A Color Image Encryption Algorithm Based on One Time Key, Chaos Theory, and Concept of Rotor Machine., , , , , , and . IEEE Access, (2020)Violating the standard assumption underlying the process monitoring: Perfect measurements., , , , and . Qual. Reliab. Eng. Int., 38 (4): 2065-2109 (2022)An innovative technique for image encryption using tri-partite graph and chaotic maps., , and . Multim. Tools Appl., 80 (14): 21979-22005 (2021)