Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaborative Modes on Collaborative Problem Solving., , , , , and . HCI (5), volume 9735 of Lecture Notes in Computer Science, page 3-10. Springer, (2016)Using Ontology to Establish Social Context and Support Social Reasoning., , , and . IVA, volume 3661 of Lecture Notes in Computer Science, page 344-357. Springer, (2005)Innovative Applications and Security of Internet of Things., , and . IJDSN, (2014)An Elliptic Curve Cryptography-Based RFID Authentication Securing E-Health System., and . IJDSN, (2015)A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security., , , and . GPC, volume 6104 of Lecture Notes in Computer Science, page 407-417. Springer, (2010)Optimal age-replacement model with age-dependent type of failure and random lead time based on a cumulative repair-cost limit policy., , and . Ann. Oper. Res., 181 (1): 723-744 (2010)Authenticated Diffie-Hellman Key Agreement Scheme that Protects Client Anonymity and Achieves Half-Forward Secrecy.. Mob. Inf. Syst., (2015)On optimal preventive-maintenance policy for generalized Polya process repairable products under free-repair warranty., , and . Eur. J. Oper. Res., 279 (1): 68-78 (2019)The optimal preventive-maintenance policy for a NHPBP repairable system under free-repair warranty.. Reliab. Eng. Syst. Saf., (2019)Design and Implementation of MQTT-Based Over-the-Air Updating Against Curious Brokers., and . IEEE Internet Things J., 11 (6): 10768-10777 (March 2024)