Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks., , , and . IEEE Commun. Surv. Tutorials, 14 (2): 380-400 (2012)Web Enabled Client-Server Model for Development Environment of Distributed Image Processing., , and . GRID, volume 1971 of Lecture Notes in Computer Science, page 135-145. Springer, (2000)An integrated key management and secure routing framework for Mobile Ad-Hoc Networks., , and . PST, page 96-103. IEEE Computer Society, (2012)SensorWebIDS: a web mining intrusion detection system., , and . IJWIS, 4 (1): 97-120 (2008)A Framework for Revocation of Proxy Certificates in a Grid., , and . SNPD (3), page 532-537. IEEE Computer Society, (2007)WiFi Miner: An Online Apriori-Infrequent Based Wireless Intrusion System., , and . KDD Workshop on Knowledge Discovery from Sensor Data, volume 5840 of Lecture Notes in Computer Science, page 76-93. Springer, (2008)An Adaptive Generalized Scheduler for Grid Applications., and . HPCS, page 188-194. IEEE Computer Society, (2005)Construction of a Webportal and User Management Framework for Grid., , , , , , and . HPCS, page 14. IEEE Computer Society, (2007)A Unified Scheduling Algorithm for Grid Applications., and . HPCS, page 1. IEEE Computer Society, (2006)PKI-Based Authentication Mechanisms in Grid Systems., , and . IEEE NAS, page 83-90. IEEE Computer Society, (2007)