Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Key Recovery Mechanism for Reliable Group Key Management., and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 372-386. Springer, (2003)An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme., and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 93-104. Springer, (2007)Company Name Discrimination in Tweets using Topic Signatures Extracted from News Corpus., , and . JCSE, (2016)Identity-Based Key Issuing Without Secure Channel in a Broad Area., and . WISA, volume 4298 of Lecture Notes in Computer Science, page 30-44. Springer, (2006)Integration Analysis of Diverse Genomic Data Using Multi-clustering Results., , , and . ISBMDA, volume 4345 of Lecture Notes in Computer Science, page 37-48. Springer, (2006)Design and performance analysis of a noncoherent code tracking loop with variable loop bandwidth., , , and . PIMRC, page 1380-1384. IEEE, (2003)An Integrated Benchmark Suite for Database Systems., and . ISDB, page 74-79. Acta Press, (2002)Non-Uniform Spectral Compression with the Formant-Emphasized Filterbank for Noisy Speech Recognition., , , and . IPCV, page 570-573. CSREA Press, (2007)Comparative Performance of State-of-the-Art Classifiers in Computer-Aided Detection for CT Colonography., , and . Abdominal Imaging, volume 7601 of Lecture Notes in Computer Science, page 78-87. Springer, (2012)Efficient Unilateral Authentication Mechanism for MIPv6., , , and . International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 908-911. Springer, (2006)