Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Two's Complement Quasi-Serial Multiplier., and . IEEE Trans. Computers, 24 (12): 1233-1235 (1975)A Distributed Security Architecture for ad hoc Networks., , and . Wireless Information Systems, page 81-91. INSTICC Press, (2005)972-8865-21-X.Enhancing Message Privacy in WEP., and . Wireless Information Systems, page 23-32. INSTICC Press, (2005)972-8865-21-X.Dynamic microprogramming in a time sharing environment.. MICRO, page 55-60. ACM, (1977)Interactive Evolution of Particle Systems for Computer Graphics and Animation., , and . IEEE Trans. Evol. Comput., 13 (2): 418-432 (2009)Simulation Methods and Applications., and . Simul. Pract. Theory, 9 (3-5): 91-93 (2002)A Secure Service-Oriented Routing Algorithm for Heterogeneous Wireless Mesh Networks., , and . GLOBECOM, page 1-5. IEEE, (2011)Understanding the intruder through attacks on cryptographic protocols., , and . ACM Southeast Regional Conference, page 667-672. ACM, (2006)A Parameterized Analysis of Public-Key Protocols: Needham-Schroeder and Kerberos-5., , and . ICON, page 1-6. IEEE, (2006)Detecting Obfuscated Viruses Using Cosine Similarity Analysis., , and . Asia International Conference on Modelling and Simulation, page 165-170. IEEE Computer Society, (2007)