Author of the publication

An anonymous and secure authentication and key agreement scheme for session initiation protocol.

, , and . Multimedia Tools Appl., 76 (2): 2315-2329 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating Weighted Fuzzy Rules from Training Instances Using Genetic Algorithms to Handle the Iris Data Classification Problem., and . J. Inf. Sci. Eng., 22 (1): 175-188 (2006)Generating Weighted Fuzzy Rules for Handling Classification Problems., and . Int. J. Electron. Bus. Manag., 3 (2): 116-128 (2005)A Hidden Markov Model For Conversion Rate Dynamics In Online Retail., , , and . ICIS, Association for Information Systems, (2012)The Economic Role of Rating Behavior in Third-Party Application Market., , , and . ICIS, Association for Information Systems, (2011)A Note on the Single Genotype Resolution Problem., , , , and . J. Comput. Sci. Technol., 19 (2): 254-257 (2004)Taking complementary advantages: Improving exploration via double self-imitation learning in procedurally-generated environments., , , , , and . Expert Syst. Appl., 238 (Part E): 122145 (March 2024)An Analysis of the EIC Method for OFDM/OQAM Systems., , , and . J. Commun., 4 (1): 52-60 (2009)Serial-batching scheduling with two agents to minimize makespan and maximum cost., , and . J. Sched., 23 (5): 609-617 (2020)Algorithm 1038: KCC: A MATLAB Package for k-Means-based Consensus Clustering., , , , and . ACM Trans. Math. Softw., 49 (4): 40:1-40:27 (December 2023)Aging or Glitching? What Leads to Poor Android Responsiveness and What Can We Do About It?, , , , , , and . IEEE Trans. Mob. Comput., 23 (2): 1521-1533 (February 2024)