Your selections:
Blind detection of copy-move forgery in digital audio forensics
- Imran, Muhammad, Ali, Zulfiqar, Bakhsh, Sheikh, Akram, Sheeraz
Bio-inspired network security for 5G-enabled IoT applications
- Saleem, Kashif, Alabduljabbar, Ghadah, Alrowais, Nouf, Al-Muhtadi, Jalal, Imran, Muhammad, Rodrigues, Joel
A secure and efficient IP multimedia subsystem authentication mechanism for LTE
- Ashraf, Humaira, Sher, Muhammad, Ghafoor, Ata, Imran, Muhammad
Secure authentication for remote patient monitoring withwireless medical sensor networks
- Hayajneh, Taier, Mohd, Bassam, Imran, Muhammad, Almashaqbeh, Ghada, Vasilakos, Athanasios
Are you sure you would like to clear your session, including search history and login status?