Author of the publication

A new generalized software complexity metric for distributed programs.

, and . Inf. Softw. Technol., 40 (5-6): 259-269 (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DANS: A Secure and Efficient Driver-Abnormal Notification Scheme With IoT Devices Over IoV., and . IEEE Syst. J., 13 (2): 1628-1639 (2019)A new generalized software complexity metric for distributed programs., and . Inf. Softw. Technol., 40 (5-6): 259-269 (1998)Identifying Smartphone Malware Using Data Mining Technology., and . ICCCN, page 1-6. IEEE, (2011)Strengthening digital rights management using a new driver-hidden rootkit.. IEEE Trans. Consumer Electronics, 58 (2): 479-483 (2012)A Secure Authentication Scheme with Anonymity for Wireless Communications., , and . IEEE Communications Letters, 12 (10): 722-723 (2008)An Anti-Counterfeit and Traceable Management System for Brand Clothing with Hyperledger Fabric Framework., , , , , , and . Symmetry, 13 (11): 2048 (2021)On the design of secure group-oriented communication channels in Internet environments., and . PIMRC, page 1243-1247. (1996)A mobile agent protected scheme using pairing-based cryptosystems., and . Int. J. Mob. Commun., 3 (2): 183-196 (2005)Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control., , and . ACM Trans. Intell. Syst. Technol., 9 (1): 10:1-10:23 (2017)A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks., and . ISPA Workshops, volume 4743 of Lecture Notes in Computer Science, page 513-522. Springer, (2007)