Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fuzzy quantified SWOT procedure for environmental evaluation of an international distribution center., and . Inf. Sci., 178 (2): 531-549 (2008)Advances in Reconfigurable Antenna Systems Facilitated by Innovative Technologies., , , , and . IEEE Access, (2018)An efficient user identification scheme based on ID-based cryptosystem., , and . Comput. Stand. Interfaces, 26 (6): 565-569 (2004)Recent Advances in Reconfigurable Antennas at University of Technology Sydney., , and . J. Commun. Inf. Networks, 3 (1): 15-20 (2018)A Digital Combining Applied to the Multilevel Pulse Modulated Polar Transmitter., , , , , and . IEEE Access, (2023)Prototyping a New Identity Authentication Framework for IP Telephony., , , and . SECURWARE, page 47-52. IEEE Computer Society, (2008)Cryptanalysis of an authenticated encryption scheme using self-certified public keys., , and . Appl. Math. Comput., 166 (1): 118-122 (2005)Gibbs-Phenomenon-Reduced Digital PWM for Power Amplifiers Using Pulse Modulation., , , , , and . IEEE Access, (2019)A New Multi-Feature Recommendation Model Based on Recurrent Neural Network., , , , and . CSCloud/EdgeCom, page 235-240. IEEE, (2023)On the Security of an Enhanced Authentication Key Exchange Protocol., , , and . AINA (2), page 160-163. IEEE Computer Society, (2004)