Author of the publication

Safe Authentication Method for Security Communication in Ubiquitous.

, , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 442-448. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study on Context Services Model with Location Privacy., , , and . ARES, volume 6908 of Lecture Notes in Computer Science, page 321-329. Springer, (2011)Case Study: Continual Evaluation of IT Process Portfolio in SME based on Val IT 2.0., , , and . SMA, page 10-14. ACM, (2020)Feasibility Study of Deep Neural Network for Heart Rate Estimation from Wearable Photoplethysmography and Acceleration Signals., , , and . EMBC, page 3633-3636. IEEE, (2019)Cultural Intelligence and ARCS Model for Digital Era., , and . WIMS, page 28:1-28:4. ACM, (2019)EKRUCAmI Architecture - Applications in Healthcare Domain., , , , , , , , and . State of the Art in AI Applied to Ambient Intelligence, volume 298 of Frontiers in Artificial Intelligence and Applications, IOS Press, (2017)Smart home energy strategy based on human behaviour patterns for transformative computing., , , , , , and . Inf. Process. Manag., 57 (5): 102256 (2020)Extraction of abstracted sensory data to reduce the execution time of context-aware services in wearable computing environments., , , , and . Concurr. Comput. Pract. Exp., (2020)Cognitive systems and operations research in big data and cloud computing., and . Ann. Oper. Res., 265 (2): 183-186 (2018)Design and Implementation of BCI-based Intelligent Upper Limb Rehabilitation Robot System., , and . ACM Trans. Internet Techn., 21 (3): 60:1-60:17 (2021)ECG-Based Advanced Personal Identification Study With Adjusted (Qi * Si)., , , , , , and . IEEE Access, (2019)