Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Handwritten Signature Image., , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 43-50. Springer, (2009)A Comparative Study of Wireless Sensor Networks and Their Routing Protocols., , and . Sensors, 10 (12): 10506-10523 (2010)Clustering and Flow Conservation Monitoring Tool for Software Defined Networks., , and . Sensors, 18 (4): 1079 (2018)At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid., , , and . IWCMC, page 1067-1072. IEEE, (2019)A novel Approach for Privacy-Preserving Data Aggregation in Smart Grid., , , and . IWCMC, page 1060-1066. IEEE, (2019)A novel adaptive streaming approach for cloud-based mobile video games., , and . IWCMC, page 1072-1077. IEEE, (2017)A novel privacy technique for Augmented Reality cloud gaming based on image authentication., , and . IWCMC, page 252-257. IEEE, (2017)A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks., , and . IWCMC, page 1193-1198. IEEE, (2015)Web Services in Multimedia Communication., , , and . Adv. Multim., (2012)U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home., , , and . J. Supercomput., 45 (1): 88-104 (2008)