Author of the publication

An Application-Level Data Transparent Authentication Scheme without Communication Overhead.

, , , , and . IEEE Trans. Computers, 59 (7): 943-954 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flow-Sensitive Type-Based Heap Cloning (Artifact)., , and . Dagstuhl Artifacts Ser., 6 (2): 01:1-01:2 (2020)FlexFlow: A Flexible Flow Control Policy Specification Framework., , and . DBSec, volume 142 of IFIP, page 358-371. Kluwer/Springer, (2003)Estimating the Number of Nodes in a Mobile Wireless Network.. GLOBECOM, page 1-5. IEEE, (2010)P2P-Based Web Text Information Retrieval., and . APWeb, volume 3399 of Lecture Notes in Computer Science, page 247-252. Springer, (2005)TruXy: Trusted Storage Cloud for Scientific Workflows., , , , , , , and . IEEE Trans. Cloud Computing, 5 (3): 428-442 (2017)Cost-Efficient Stream Processing on the Cloud., , , and . CLOUD, page 209-213. IEEE, (2019)Malytics: A Malware Detection Scheme., , , and . CoRR, (2018)An adaptive prediction approach based on workload pattern discrimination in the cloud., , , , , and . J. Netw. Comput. Appl., (2017)BDSP: A Fair Blockchain-enabled Framework for Privacy-Enhanced Enterprise Data Sharing., , , , , and . CoRR, (2022)Evaluating users' experiences of electronic prescribing systems in relation to patient safety: a mixed methods study., , , and . BMC Medical Informatics Decis. Mak., 20 (1): 62 (2020)