Author of the publication

P2PM-pay: Person to Person Mobile Payment Scheme Controlled by Expiration Date.

, , , and . Wireless Personal Communications, 85 (1): 289-304 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FASSVid: Fast and Accurate Semantic Segmentation for Video Sequences., , , , , , , , and . Entropy, 24 (7): 942 (2022)A Novel Framework for Generating Personalized Network Datasets for NIDS Based on Traffic Aggregation., , , , , , , and . Sensors, 22 (5): 1847 (2022)Classification of network anomalies in flow level network traffic using Bayesian networks., , , , , and . CONIELECOMP, page 238-243. IEEE, (2018)Detecting anomalies in network traffic using the method of remaining elements., , , and . IEEE Communications Letters, 13 (6): 462-464 (2009)An unsupervised approach for traffic trace sanitization based on the entropy spaces., , , , and . Telecommun. Syst., 61 (3): 609-626 (2016)P2PM-pay: Person to Person Mobile Payment Scheme Controlled by Expiration Date., , , and . Wireless Personal Communications, 85 (1): 289-304 (2015)Security Enhancement on Li-Lee's Remote User Authentication Scheme Using Smart Card., , and . Computación y Sistemas, (2014)Detecting anomalies in network traffic using Entropy and Mahalanobis distance., , and . CONIELECOMP, page 86-91. IEEE, (2012)PEAL: Power Efficient and Adaptive Latency Hierarchical Routing Protocol for Cluster-Based WSN., , , , , , and . Wirel. Pers. Commun., 96 (4): 4929-4945 (2017)