Author of the publication

Anonymous Secure Framework in Connected Smart Home Environments.

, , , , and . IEEE Trans. Information Forensics and Security, 12 (4): 968-979 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Coverage Tree Construction Scheme for Wireless Sensor Networks., , , and . Wireless Personal Communications, 82 (1): 659-674 (2015)3-D Shape Reconstruction Based CT Image Enhancement., and . Handbook of Multimedia Information Security, Springer, (2019)Wavelet Packet Based CT Image Denoising Using Bilateral Method and Bayes Shrinkage Rule., and . Handbook of Multimedia Information Security, Springer, (2019)Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images., , and . J. Intelligent Systems, 27 (1): 91-103 (2018)RUASN: A Robust User Authentication Framework for Wireless Sensor Networks., , , , and . Sensors, 11 (5): 5020-5046 (2011)Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey., and . Sensors, 12 (1): 55-91 (2012)Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach., , , , and . GLOBECOM, page 1-6. IEEE, (2015)Performance Evaluation of Mobile Ad Hoc Routing Mechanisms., , , and . Wireless Personal Communications, 85 (2): 377-392 (2015)Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks., , , and . IEEE Access, (2019)Effective Ways of Secure, Private and Trusted Cloud Computing, , , , and . CoRR, (2011)