Author of the publication

A novel approach for re-authentication protocol using personalized information.

, , , , and . ICMLC, page 1826-1829. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SBAD: Sequence Based Attack Detection via Sequence Comparison., , , and . PSDML, volume 6549 of Lecture Notes in Computer Science, page 78-91. Springer, (2010)A Framework for Robustness Evaluation in AI-Based Malware Detectors., , and . ICCE-Taiwan, page 287-288. IEEE, (2023)A multiclass neural network classifier with fuzzy teaching inputs., , and . Fuzzy Sets Syst., 91 (1): 15-35 (1997)Personalized e-learning system using Item Response Theory., , and . Comput. Educ., 44 (3): 237-255 (2005)XML Evolution: A Two-phase XML Processing Model Using XML Prefiltering Techniques., , , and . VLDB, page 1215-1218. ACM, (2006)Using a Paper-based Digital Pen for Supporting English Courses in Regular Classrooms to Improve Reading Fluency., , and . Int. J. Humanit. Arts Comput., 7 (Supplement): 234-246 (2013)An efficient fuzzy classifier with feature selection based on fuzzy entropy., , , and . IEEE Trans. Syst. Man Cybern. Part B, 31 (3): 426-432 (2001)DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps., , , and . TrustCom/BigDataSE/ISPA (1), page 1014-1021. IEEE, (2015)Efficient GML-native processors for web-based GIS: techniques and tools., , , and . GIS, page 91-98. ACM, (2006)Semantic Similarity Measurement of Chinese Financial News Titles Based on Event Frame Extracting., , , and . ICEBE, page 229-236. IEEE Computer Society, (2006)