Author of the publication

Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System.

, , , , and . Networking Workshops, volume 6827 of Lecture Notes in Computer Science, page 243-250. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography., , and . CloudCom, volume 5931 of Lecture Notes in Computer Science, page 167-177. Springer, (2009)Automatic Web Service Detection in Oil and Gas., , and . FGIT-FGCN, volume 56 of Communications in Computer and Information Science, page 193-200. Springer, (2009)Authenticated health monitoring scheme for wireless body sensor networks., and . BODYNETS, page 31-35. ICST / ACM, (2012)Improve Security Over Multiple Cloud Service Providers for Resource Allocation., , and . ICDIS, page 145-148. IEEE, (2018)Multi-tenant Network Monitoring Based on Software Defined Networking., and . OTM Conferences, volume 8185 of Lecture Notes in Computer Science, page 327-341. Springer, (2013)Flexible building blocks for software defined network function virtualization., and . QSHINE, page 37-43. IEEE, (2014)Deployment models: Towards eliminating security concerns from cloud computing., , , and . HPCS, page 189-195. IEEE, (2010)Household Power Demand Prediction Using Evolutionary Ensemble Neural Network Pool with Multiple Network Structures., , and . Sensors, 19 (3): 721 (2019)Mobile contact synchronous with cloud server., , and . Appl. Soft Comput., (2017)Flexible Building Blocks for Software Defined Network Function Virtualization., and . EAI Endorsed Trans. Cloud Syst., 2 (7): e4 (2016)