Author of the publication

A LoRaWAN Based Energy Efficient Data Encryption Method.

, , , , and . IMIS, volume 994 of Advances in Intelligent Systems and Computing, page 493-502. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low Leakage TCAM for IP Lookup Using Two-Side Self-Gating., , and . IEEE Trans. on Circuits and Systems, 60-I (6): 1478-1486 (2013)LMI-based fuzzy control for a class of time-delay discrete fuzzy bilinear system., , and . FUZZ-IEEE, page 796-801. IEEE, (2009)Distinguishable error detection method for Network on Chip., , , and . ISCAS, page 3733-3736. IEEE, (2010)Power and Area Efficiency NoC Router Design for Application-Specific SoC by Using Buffer Merging and Resource Sharing., , and . ACM Trans. Design Autom. Electr. Syst., 19 (4): 36:1-36:21 (2014)A Group File Encryption Method using Dynamic System Environment Key., , , and . NBiS, page 476-483. IEEE Computer Society, (2014)A low power detection routing method for bufferless NoC., , , , and . ISQED, page 364-367. IEEE, (2013)An ECC-based secure EMR transmission system with data leakage prevention scheme., , and . Int. J. Comput. Math., 93 (2): 367-383 (2016)Synthesis of partition-codec architecture for low power and small area circuit design., , , , and . ISCAS (5), page 523-526. IEEE, (2001)An entropy-based algorithm to reduce area overhead for bipartition-codec architecture., , , , , and . ISCAS (5), page 49-52. IEEE, (2001)An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques., , , and . IEEE Systems Journal, 11 (2): 427-438 (2017)