Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing lifetime of event-unobservable wireless sensor networks., , , and . Comput. Stand. Interfaces, 33 (4): 401-410 (2011)The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks., , , and . IEEE Trans. Computers, 63 (11): 2866-2879 (2014)TwinCloud: Secure cloud sharing without explicit key management., , and . CNS, page 581-585. IEEE, (2016)Leveraging human computation for pure-text Human Interaction Proofs., and . Int. J. Hum. Comput. Stud., (2016)Towards Usable Solutions to Graphical Password Hotspot Problem., , , , and . COMPSAC (2), page 318-323. IEEE Computer Society, (2009)978-0-7695-3726-9.Mobility Helps Energy Balancing in Wireless Networks., , and . MILCOM, page 293-298. IEEE, (2013)A Survey of Visual Sensor Network Platforms, , , and . Multimedia Tools and Applications, 60 (3): 689-726 (October 2012)Johnny in internet café: user study and exploration of password autocomplete in web browsers., , and . Digital Identity Management, page 33-42. ACM, (2011)A New Design of Privilege Management Infrastructure with Binding Signature Semantics., and . EuroPKI, volume 3093 of Lecture Notes in Computer Science, page 306-313. Springer, (2004)Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs., , , and . CCWC, page 774-779. IEEE, (2020)