Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing network connectivity using smart mobile sensors., , and . ATNAC, page 1-6. IEEE, (2011)Cybersecurity Policy Framework in Saudi Arabia: Literature Review., and . Frontiers Comput. Sci., (2021)A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices., , and . Math. Comput. Model., 58 (1-2): 108-116 (2013)Anonymous paperless secure payment system using clouds., , and . J. Supercomput., 72 (5): 1813-1824 (2016)Anonymous proximity mobile payment (APMP)., , , and . Peer-to-Peer Netw. Appl., 7 (4): 620-627 (2014)Fine-grained updates in database management systems for flash memory., and . Inf. Sci., 179 (18): 3162-3181 (2009)Dynamic scheduling scheme for handling traffic multiplicity in wavelength division multiplexed optical networks., , , and . ICCCN, page 344-349. IEEE, (1999)The case for a dynamic proxy framework with voluntary/incentive-based client hosting scheme., , , and . J. Netw. Comput. Appl., 30 (1): 167-185 (2007)SDMw: Secure Dynamic Middleware for Defeating Port and OS Scanning., , and . Future Internet, 9 (4): 67 (2017)QoS multicast routing using Explore Best Path., , and . Comput. Commun., 29 (15): 2881-2894 (2006)