Author of the publication

Interoperable internet scale security framework for RFID networks.

, , and . ICDE Workshops, page 94-99. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering Household Electricity Use Profiles.. MLSDA@AUS-AI, page 19. ACM, (2013)System Recovery Concepts in a Distributed Processing System., , , and . ICC (2), page 558-561. Elsevier, (1984)A framework for parallel computational physics algorithms on multi-core: SPH in parallel., , and . Adv. Eng. Softw., 42 (11): 999-1008 (2011)No peeking: privacy-preserving demand response system in smart grids., , , and . Int. J. Parallel Emergent Distributed Syst., 29 (3): 290-315 (2014)InkBoard - Tablet PC Enabled Designoriented Learning., , , and . CATE, page 154-160. ACTA Press, (2004)An events based algorithm for distributing concurrent tasks on multi-core architectures., , and . Comput. Phys. Commun., 181 (2): 341-354 (2010)Design and implementation of Negative Authentication System., , , , , , , , and . Int. J. Inf. Sec., 18 (1): 23-48 (2019)P3: Privacy Preservation Protocol for Automatic Appliance Control Application in Smart Grid., , , and . IEEE Internet Things J., 1 (5): 414-429 (2014)G-NAS: A grid-based approach for negative authentication., , , , , , , and . CICS, page 9-18. IEEE, (2014)A malicious activity detection system utilizing predictive modeling in complex environments., , , , , , , and . CCNC, page 371-379. IEEE, (2014)