Rizwan Akhtar

Orcid: 0000-0003-0023-5056

According to our database1, Rizwan Akhtar authored at least 17 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Data driven Approaches for Demand Forecasting in Supply Chain for Business Decisions.
Proceedings of the 5th International Conference on Advancements in Computational Sciences, 2024

2021
RBM: Region-Based Mobile Routing Protocol for Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2021

An Energy Spectrum Algorithm for Wind Direction Retrieval From X-Band Marine Radar Image Sequences.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021

S-DPS: An SDN-Based DDoS Protection System for Smart Grids.
Secur. Commun. Networks, 2021

Hierarchical Routing Protocols for Wireless Sensor Networks: Functional and Performance Analysis.
J. Sensors, 2021

2020
Secure Framework Enhancing AES Algorithm in Cloud Computing.
Secur. Commun. Networks, 2020

Provenance Transmission through a Two-Dimensional Covert Timing Channel in WSNs.
Mob. Inf. Syst., 2020

A Lightweight Location-Aware Fog Framework (LAFF) for QoS in Internet of Things Paradigm.
Mob. Inf. Syst., 2020

2019
Content distribution and protocol design issue for mobile social networks: a survey.
EURASIP J. Wirel. Commun. Netw., 2019

2018
Cluster-Based Arithmetic Coding for Data Provenance Compression in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018

Architecture for Collision-Free Communication Using Relaxation Technique.
Wirel. Commun. Mob. Comput., 2018

Multi-panel medical image segmentation framework for image retrieval system.
Multim. Tools Appl., 2018

A Blockchain-Based Scheme for Secure Data Provenance in Wireless Sensor Networks.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

2015
Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme.
Wirel. Pers. Commun., 2015

Architecture of Hybrid Mobile Social Networks for Efficient Content Delivery.
Wirel. Pers. Commun., 2015

2014
Rumor Riding: An Anonymity Approach for Decentralized Peer to Peer Systems.
Wirel. Pers. Commun., 2014

Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC).
Wirel. Pers. Commun., 2014


  Loading...