Search for persons
X
?
2023 5th International Conference on Energy, Power and Environment: Towards Flexible Green Energy Technologies (ICEPE) ,
3
BASB-SG: A Biohashing-based Authentication Scheme for Secur..:
, In:
?
Communications in Computer and Information Science; Advances in Computing and Data Sciences ,
4
VSMAS2HN: Verifiably Secure Mutual Authentication Scheme fo..:
, In:
?
2023 3rd International Conference on Advancement in Electronics & Communication Engineering (AECE) ,
6
Demystifying the Role of Big Data Analytics in IIoT-Based C..:
, In:
?
Advances in Information Communication Technology and Computing; Lecture Notes in Networks and Systems ,
7
A Review on Authentication Schemes for the Internet of Dron..:
, In:
?
ICT Analysis and Applications; Lecture Notes in Networks and Systems ,
8
Digital Twin in the Aviation Industry and the Role of Machi..:
, In:
?
2022 4th International Conference on Artificial Intelligence and Speech Technology (AIST) ,
9
Application of an Intrusion Detection System in Smart Citie..:
, In:
?
Lecture Notes in Networks and Systems; Inventive Communication and Computational Technologies ,
10
SASH: Secure Authentication Scheme for Smart Home Environme..:
, In:
?
2022 4th International Conference on Artificial Intelligence and Speech Technology (AIST) ,
11
Exposition of E-Healthcare and E-Referral Systems and the r..:
, In:
?
Proceedings of the 6th International Conference on Advance Computing and Intelligent Engineering; Lecture Notes in Networks and Systems ,
12
PUASIoT: Password-Based User Authentication Scheme for IoT ..:
, In:
?
2022 4th International Conference on Artificial Intelligence and Speech Technology (AIST) ,
13
Comparative analysis of pre-trained Convolution Neural Netw..:
, In:
?
Mobile Radio Communications and 5G Networks; Lecture Notes in Networks and Systems ,
14
A Framework of a Filtering and Classification Techniques fo..:
, In:
?
2022 4th International Conference on Artificial Intelligence and Speech Technology (AIST) ,
15