Author of the publication

Mobile agent watermarking (MAW): security properties and attacks revisited.

, , , , and . FIT, page 32:1-32:6. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile agent watermarking (MAW): security properties and attacks revisited., , , , and . FIT, page 32:1-32:6. ACM, (2009)Position based Optimization of RF MAC Protocol for Sensing Technology Enabled Applications., , , , and . VTC Spring, page 1-5. IEEE, (2021)Performance analysis of prioritized and non prioritized handoff call queuing schemes in mobile cellular networks., , , and . FIT, page 11:1-11:6. ACM, (2009)Effects of perceived ease of use on SNSs-addiction through psychological dependence, habit: the moderating role of perceived usefulness., , and . Int. J. Bus. Inf. Syst., 33 (3): 383-407 (2020)Knowledge Management-Based Artificial Intelligence (AI) Adoption in Construction SMEs: The Moderating Role of Knowledge Integration., , and . IEEE Trans. Engineering Management, (2024)CLUSMA: a mobile agent based clustering middleware for wireless sensor networks., , , , and . FIT, page 63:1-63:4. ACM, (2009)Bluetooth Low Energy based Communication Framework for Intra Vehicle Wireless Sensor Networks., and . FIT, page 29-34. IEEE Computer Society, (2017)Personality Traits as Predictor of M-Payment Systems: A SEM-Neural Networks Approach., , and . JOEUC, 31 (4): 89-110 (2019)Factors Affecting Retailer's Adopti on of Mobile Payment Systems: A SEM-Neural Network Modeling Approach., and . Wireless Personal Communications, 103 (3): 2529-2551 (2018)Novel approaches for scheduling task graphs in heterogeneous distributed computing environment., , , , and . Int. Arab J. Inf. Technol., 12 (3): 270-277 (2015)