Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight key management scheme to enhance the security of internet of things., , , , and . Int. J. Wirel. Mob. Comput., 5 (2): 191-198 (2012)Multi-objective optimization for coverage control in wireless sensor network with adjustable sensing radius., , , , and . Comput. Math. Appl., 57 (11-12): 1767-1775 (2009)Energy efficient coverage control in wireless sensor networks based on multi-objective genetic algorithm., , , and . Comput. Math. Appl., 57 (11-12): 1756-1766 (2009)A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Data and Time Checking Technology., , and . IIH-MSP, page 221-224. IEEE Computer Society, (2007)A New Method of TOE Architecture Based on the ML403 Development Board in Linux., , , and . IMSCCS (2), page 160-166. IEEE Computer Society, (2006)0-7695-2581-4.Research and Implementation of Zero-Copy Technology Based on Device Driver in Linux., , , and . IMSCCS (2), page 129-134. IEEE Computer Society, (2006)0-7695-2581-4.An Algorithm of Signal De-noising by Using Wavelet Analysis., , and . ISDA (3), page 51-55. IEEE Computer Society, (2006)The Design and Implementation of Zero-Copy for Linux., , , and . ISDA (1), page 121-126. IEEE Computer Society, (2008)nPAKE: An Improved Group PAKE Protocol., , and . WISA, page 115-118. IEEE Computer Society, (2012)Utility-Based Replication Strategies in Data Grids., , , , and . GCC, page 500-507. IEEE Computer Society, (2006)