Author of the publication

Using one-time passwords to prevent password phishing attacks.

, , and . J. Netw. Comput. Appl., 34 (4): 1292-1301 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provision and consumption of linked open data: a define-produce-invoke approach., , , and . Serv. Oriented Comput. Appl., 12 (3-4): 211-226 (2018)MSABot: A Chatbot Framework for Assisting in the Development and Operation of Microservice-Based Systems., , and . ICSE (Workshops), page 36-40. ACM, (2020)BPEL Extensions to User-Interactive Service Delivery., , , and . J. Inf. Sci. Eng., 25 (5): 1427-1445 (2009)Genetic algorithm for QoS-aware dynamic web services composition., , , , and . ICMLC, page 3246-3251. IEEE, (2010)An Aspect-Oriented Approach for Mobile Embedded Software Modeling., , , and . ICCSA (2), volume 6017 of Lecture Notes in Computer Science, page 257-272. Springer, (2010)Multi-agent automatic negotiation and argumentation for courses scheduling., , , and . FUZZ-IEEE, page 2690-2695. IEEE, (2011)An Embedded Software Modeling and Process by Using Aspect-Oriented Approach., , and . JSEA, 4 (2): 106-122 (2011)Integrating Process and Work Breakdown Structure with Design Structure Matrix., , , , , and . J. Adv. Comput. Intell. Intell. Informatics, 14 (5): 512-522 (2010)MASA: A Cross-Platform Component Architecture for Building Mobile Applications with Service Caching., , , , and . ICEBE, page 264-269. IEEE Computer Society, (2016)Extending the Multiple Domain Matrix by Using Business Process Model and Notation for Business Process Analysis., , , , and . ICEBE, page 311-318. IEEE Computer Society, (2015)