Author of the publication

I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks.

, , , and . MUE, page 102-107. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining the blogosphere to generate local cuisine hotspots for mobile map service., , and . ICDIM, page 152-159. IEEE, (2009)Global and Local Search Algorithms for Concave Cost Transshipment Problems., , , and . J. Glob. Optim., 33 (1): 123-156 (2005)Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks., , , and . AINA Workshops, page 1272-1277. IEEE Computer Society, (2008)Counteract SYN flooding using second chance packet filtering., , , , and . ICUIMC, page 216-220. ACM, (2009)Applying lightweight directory access protocol service on session certification authority., , and . Comput. Networks, 38 (5): 675-692 (2002)Toward Automatic Expertise Identification of Blogger., , , , , and . EJC, volume 190 of Frontiers in Artificial Intelligence and Applications, page 212-223. IOS Press, (2008)Automatic Web Service Selection Using Ontology and Quality of Service., , , , and . Int. J. Electron. Bus. Manag., 5 (1): 1-10 (2007)I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks., , , and . MUE, page 102-107. IEEE Computer Society, (2008)Mining the Blogosphere to Generate Cuisine Hotspot Maps., , and . J. Digit. Inf. Manag., 8 (6): 396-401 (2010)Automating the Determination of Open Reading Frames in Genomic Sequences Using the Web Service Techniques -- A Case Study using SARS Coronavirus., , , , , and . BIBE, page 451-458. IEEE Computer Society, (2004)