Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effects of Feature Trimming on Encryption Key Stability for an ICmetric System., , , and . BLISS, page 87-91. IEEE Computer Society, (2008)Integrating Multi-Modal Circuit Features within an Efficient Encryption System., , , and . IAS, page 83-88. IEEE Computer Society, (2007)Key Generation for Secure Inter-satellite Communication., , , and . AHS, page 671-681. IEEE Computer Society, (2007)Normalizing Discrete Circuit Features with Statistically Independent values for incorporation within a highly Secure Encryption System., , , and . AHS, page 97-102. IEEE Computer Society, (2007)Integrating Feature Values for Key Generation in an ICmetric System., , , and . AHS, page 82-88. IEEE Computer Society, (2009)Investigation of Sample Sizes and Correlation in Multi-Cluster Feature Distributions for an Efficient Encryption System., , , and . AHS, page 409-416. IEEE Computer Society, (2008)Ensuring data integrity via ICmetrics based security infrastructure., , , and . AHS, page 75-81. IEEE Computer Society, (2007)Novel Techniques for Ensuring Secure Communications for Distributed Low Power Devices., , and . AHS, page 343-350. IEEE Computer Society, (2006)Ensuring Secure Healthcare Communications via ICmetric Based Encryption on Unseen Devices., , , and . BLISS, page 113-117. IEEE Computer Society, (2009)Adaptive Online Profiling Hardware for ICmetrics Based Security., , , and . AHS, page 498-504. IEEE Computer Society, (2008)