Up a level |
Shagari, Nura Modi and Salleh, Rosli and Ahmedy, Ismail and Idris, Mohd Yamani Idna and Murtaza, Ghulam and Ali, Usman and Modi, Salisu (2022) A two-step clustering to minimize redundant transmission in wireless sensor network using sleep-awake mechanism. Wireless Networks, 28 (5, SI). pp. 2077-2104. ISSN 1022-0038, DOI https://doi.org/10.1007/s11276-021-02885-8.
Ali, Usman and Idris, Mohd Yamani Idna and Frnda, Jaroslav and Bin Ayub, Mohamad Nizam and Alroobaea, Roobaea and Almansour, Fahad and Shagari, Nura Modi and Ullah, Insaf and Ali, Ihsan (2022) Hyper elliptic curve based certificateless signcryption scheme for secure IIoT communications. CMC-Computers Materials & Continua, 71 (2). pp. 2515-2532. ISSN 1546-2218, DOI https://doi.org/10.32604/cmc.2022.019800.
Khan, Nauman and Bin Salleh, Rosli and Ali, Ihsan and Khan, Zahid and Mazhar, Noman and Alroobaea, Roobaea and Almansour, Fahad and Ali, Usman (2021) Enabling reachability across multiple domains without controller synchronization in SDN. CMC-Computers Materials & Continua, 69 (1). pp. 945-965. ISSN 1546-2218, DOI https://doi.org/10.32604/cmc.2021.017394.
Ali, Usman and Idris, Mohd Yamani Idna and Ayub, Mohamad Nizam and Ullah, Insaf and Ali, Ihsan and Nandy, Tarak and Yahuza, Muktar and Khan, Nauman (2021) RFID authentication scheme based on hyperelliptic curve signcryption. IEEE Access, 9. pp. 49942-49959. ISSN 2169-3536, DOI https://doi.org/10.1109/ACCESS.2021.3069429.