Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ensuring the data integrity in cloud data storage., and . CCIS, page 240-243. IEEE, (2011)Receiver-Initiated Resource Renegotiation for VBR Video Transport., and . ICIP (3), page 105-109. IEEE, (1999)Multi-Key Searchable Encryption with Designated Server., , , and . Intell. Autom. Soft Comput., 22 (2): 295-301 (2016)A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection., , , , , , and . J. Inf. Secur. Appl., (2022)Numerical simulation of anti-plane wave propagation in heterogeneous media., , , and . Appl. Math. Lett., (2023)Adaptive data partitioning for MPEG-2 video transmission over ATM based networks., and . ICIP, page 17-20. IEEE Computer Society, (1995)Sequential Routing-based Time-division Multiplexing Optimization for Multi-FPGA Systems., , , , , and . ACM Trans. Design Autom. Electr. Syst., 28 (6): 104:1-104:10 (November 2023)Static Analysis of Integer Overflow of Smart Contracts in Ethereum., and . ICCSP, page 110-115. ACM, (2020)Dynamic Searchable Encryption with Multi-user Private Search for Cloud Computing., , and . CIT/IUCC/DASC/PICom, page 176-182. IEEE, (2015)Optimal resource allocation and leaky bucket based power control for CBR MIMO systems., , and . IPCCC, page 561-566. IEEE, (2005)