Author of the publication

Security for Ubiquitous Computing: Problems and Proposed Solutionl.

, , , , , and . RTCSA, page 110-116. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Support Vector Machines on Signal Strength Based Localization in Wireless Networks., , , , and . MLMTA, page 24-30. CSREA Press, (2007)Vessel Enhancement in Angiography Images using Decimation-Free Directional Filter Bank., , , and . IPCV, page 175-181. CSREA Press, (2007)Design and Implementation of the Content Manager in a Multimedia Streaming Framework., , , and . PDPTA, CSREA Press, (2000)Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks., , , , and . IJDSN, (2012)Wellness Concepts Model Use and Effectiveness in Intelligent Knowledge Authoring Environment., and . ICOST, volume 9677 of Lecture Notes in Computer Science, page 271-282. Springer, (2016)Sedentary Behavior-Based User Life-Log Monitoring for Wellness Services., , and . ICOST, volume 9677 of Lecture Notes in Computer Science, page 283-292. Springer, (2016)Efficient routing on finding recommenders for trust-aware recommender systems., , , , and . ICUIMC, page 29:1-29:6. ACM, (2012)CSMC: chord based session management framework for software as a service cloud., , , and . ICUIMC, page 30. ACM, (2011)EAP: Energy-Awareness Predictor in Multicore CPU., , , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 361-366. Springer, (2015)Interactive Activity Recognition Using Articulated-Pose Features on Spatio-Temporal Relation., , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 345-351. Springer, (2015)