Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visualization of GML Map Using 3-Layer POI on Mobile Device., , and . ICESS, volume 4523 of Lecture Notes in Computer Science, page 328-337. Springer, (2007)Reconfiguration of Information Management Framework Based on Adaptive Grid Computing., , , and . ISPA, volume 4330 of Lecture Notes in Computer Science, page 538-548. Springer, (2006)An ANP-Based Practical Quality Model for a Secure Embedded System with Sensor Network., , and . IJDSN, (2014)Maximizing Network Lifetime of Directional Sensor Networks Considering Coverage Reliability., , and . IJDSN, (2013)Mobile Agent Oriented Service for Offloading on Mobile Cloud Computing., , and . CSA/CUTE, volume 421 of Lecture Notes in Electrical Engineering, page 920-925. Springer, (2016)A secure and scalable storage system for aggregate data in IoT., , , , and . Future Gener. Comput. Syst., (2015)Event Detection in Wireless Sensor Networks: Survey and Challenges., , , and . MUSIC, volume 274 of Lecture Notes in Electrical Engineering, page 585-590. Springer, (2013)The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits., , , , and . Wireless Personal Communications, 60 (3): 405-418 (2011)Location based authentication scheme using BLE for high performance digital content management system., , , , and . Neurocomputing, (2016)A Robust Method for Finding the Automated Best Matched Genes Based on Grouping Similar Fragments of Large-Scale References for Genome Assembly., , , and . Symmetry, 9 (9): 192 (2017)