Author of the publication

Analysis of Handwritten Signature Image.

, , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 43-50. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Handwritten Signature Image., , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 43-50. Springer, (2009)A New Authentication Scheme for Cloud-based Storage Applications., , and . SIN, page 57-60. ACM, (2016)A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect., , , , , , and . IEEE Access, (2020)Smart City and IoT., , and . Future Gener. Comput. Syst., (2017)Adaptive routing protocol for mobile ad hoc networks., , , and . Computing, 96 (9): 817-827 (2014)Editorial to special issue: computer and network applications for ubiquitous computing., , and . Computing, 96 (9): 775-776 (2014)U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home., , , and . J. Supercomput., 45 (1): 88-104 (2008)Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation., , , , and . Int. J. Commun. Netw. Syst. Sci., 2 (5): 363-370 (2009)RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys., , , and . Secur. Commun. Networks, (2018)Engaging and Effective Asynchronous Online Discussion Forums., and . FGIT-ASEA/DRBC/EL, volume 257 of Communications in Computer and Information Science, page 695-705. Springer, (2011)