Author of the publication

Security for Ubiquitous Computing: Problems and Proposed Solutionl.

, , , , , and . RTCSA, page 110-116. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Activity-oriented access control to ubiquitous hospital information and services., , , , , and . Inf. Sci., 180 (16): 2979-2990 (2010)An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography., , , , , , , , and . J. Commun. Networks, 11 (6): 599-606 (2009)Set-based unified approach for summarization of a multi-attributed graph., , and . World Wide Web, 20 (3): 543-570 (2017)On-the-Fly Output Compression for Join-Based Graph Mining Algorithms., and . IEEE Access, (2018)More reputable recommenders give more accurate recommendations?, , , , and . ICUIMC, page 24. ACM, (2013)SP2: spanner construction for shortest path computation on streaming graph., , , , and . EDB, page 43-50. ACM, (2016)Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments., , , , and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 357-360. Springer, (2006)Mining Weighted Frequent Patterns in Incremental Databases., , , and . PRICAI, volume 5351 of Lecture Notes in Computer Science, page 933-938. Springer, (2008)Mining Weighted Frequent Patterns Using Adaptive Weights., , , and . IDEAL, volume 5326 of Lecture Notes in Computer Science, page 258-265. Springer, (2008)Conflict Resolution and Preference Learning in Ubiquitous Environment., , , , and . ICIC (2), volume 4114 of Lecture Notes in Computer Science, page 355-366. Springer, (2006)