Salaja Silas

Orcid: 0000-0001-9851-6205

According to our database1, Salaja Silas authored at least 16 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A constructive airborne-ground matrix algorithm for modern telecommunication systems.
IET Networks, March, 2024

An Improved Coverage Hole Finding System for Critical Applications Based on Computational Geometric Techniques.
Scalable Comput. Pract. Exp., January, 2024

Multivariate Forecasting of Network Traffic in SDN-Based Ubiquitous Healthcare System.
IEEE Open J. Commun. Soc., 2024

2023
A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption.
Inf. Comput., October, 2023

Modelling a P-System inspired multi-objective centralized heterogeneous wireless outdoor illumination.
J. Ambient Intell. Humaniz. Comput., March, 2023

2022
Long-term traffic flow prediction using multivariate SSA forecasting in SDN based networks.
Pervasive Mob. Comput., 2022

Centrality Based Congestion Detection Using Reinforcement Learning Approach for Traffic Engineering in Hybrid SDN.
J. Netw. Syst. Manag., 2022

Investigative prototyping a tissue P system for solving distributed task assignment problem in heterogeneous wireless sensor network.
J. King Saud Univ. Comput. Inf. Sci., 2022

2021
A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography.
J. King Saud Univ. Comput. Inf. Sci., 2021

2020
An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries.
Inf. Comput., 2020

2019
An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks.
J. Inf. Secur. Appl., 2019

A novel patient friendly IT enabled framework for selection of desired healthcare provider.
Int. J. Medical Eng. Informatics, 2019

2017
Analysis of hierarchical identity based encryption schemes and its applicability to computing environments.
J. Inf. Secur. Appl., 2017

2016
EDIS: an effective method for detection and isolation of sinkhole attacks in mobile ad hoc networks.
Int. J. Wirel. Mob. Comput., 2016

2013
An efficient service selection framework for pervasive environments.
Int. J. Wirel. Mob. Comput., 2013

2012
A novel fault tolerant service selection framework for pervasive computing.
Hum. centric Comput. Inf. Sci., 2012


  Loading...