Author of the publication

A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key.

, and . Int. J. Netw. Secur., 18 (6): 1060-1070 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Optimal Scheduling Algorithm Based on Task Duplication., and . IEEE Trans. Computers, 51 (4): 444-448 (2002)A k-way Graph Partitioning Algorithm Based on Clustering by Eigenvector., and . International Conference on Computational Science, volume 3037 of Lecture Notes in Computer Science, page 598-601. Springer, (2004)ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing., , and . Future Internet, 11 (9): 195 (2019)Enhancing Write I/O Performance of Disk Array RM2 Tolerating Double Disk Failures., , , and . ICPP, page 211-218. IEEE Computer Society, (2002)Two-way Network Partitioning using Iterative Clustering.. PDPTA, page 66-74. CSREA Press, (2005)Two-way partitioning of a recursive Gaussian filter in CUDA., , and . EURASIP J. Image Video Process., (2014)A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key., and . Int. J. Netw. Secur., 18 (6): 1060-1070 (2016)A Task Duplication Based Scheduling Algorithm with Optimality Condition in Heterogeneous Systems., and . ICPP Workshops, page 531-536. IEEE Computer Society, (2002)Striping in Disk Array RM2 Enabling the Tolerance of Double Disk Failures., and . SC, page 46. IEEE Computer Society, (1996)An Improved Multi-Priority Preemptive Scheduler for Transputer-Based Real-Time Systems., , , and . RTS, page 181-186. IEEE Computer Society, (1996)