Author of the publication

Preparation of simulated inert matrix fuel with different powders by dry milling method

, , , , , , , , and . Journal of Nuclear Materials, 274 (1-2): 7--14 (August 1999)
DOI: 10.1016/S0022-3115(99)00094-X

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preparation of simulated inert matrix fuel with different powders by dry milling method, , , , , , , , and . Journal of Nuclear Materials, 274 (1-2): 7--14 (August 1999)Identity-based secure protocol scheme for wireless sensor network., , , and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 555-560. ACM, (2009)Studies on the Key Technologies of Multi-Platform Mobile Thin Client System: Cross-Layer Isolation and Session Allocation., , , , , and . FGIT-FGCN (2), volume 266 of Communications in Computer and Information Science, page 1-10. Springer, (2011)A Novel Scheme for PMIPv6 Based Wireless Sensor Network., , , and . FGIT, volume 6485 of Lecture Notes in Computer Science, page 429-438. Springer, (2010)Personal Cloud Computing Security Framework., , and . APSCC, page 671-675. IEEE Computer Society, (2010)A broker-based cooperative security-SLA evaluation methodology for personal cloud computing., and . Secur. Commun. Networks, 8 (7): 1318-1331 (2015)A Study on Cloud Forensics and Challenges in SaaS Application Environment., , , , , and . HPCC/SmartCity/DSS, page 734-740. IEEE Computer Society, (2016)Energy Efficient Framework for Mobility Supported Smart IP-WSN., , , , and . ICCCI (3), volume 6423 of Lecture Notes in Computer Science, page 282-291. Springer, (2010)Accomplishment of the key setting up: The flexible approach., , , and . ICWN, page 58-62. CSREA Press, (2008)An optimal investment scheme based on ATM considering cloud security environment., , and . IMCOM, page 93. ACM, (2017)