Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Autistic Children's Social Skills Using Virtual Reality., , , , , and . HCI (10), volume 8013 of Lecture Notes in Computer Science, page 342-351. Springer, (2013)Towards a Secure Mobile Agent Based M-Commerce System., and . ICEIS (4), page 408-412. (2003)A Collusion-Resistant Distributed Agent-Based Signature Delegation (CDASD) Protocol for E-Commerce Applications.. Intelligent Information Management, 2 (4): 262-277 (2010)Achieving Distributed Trusted Services., and . ITCC (1), page 56-61. IEEE Computer Society, (2004)DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Schem., , and . IPDPS, IEEE Computer Society, (2005)A secure method for signature delegation to mobile agents., and . SAC, page 813-818. ACM, (2004)A context-constrained authorisation (CoCoA) framework for pervasive grid computing., , , and . Wireless Networks, 16 (6): 1541-1556 (2010)A secure proxy signature protocol for agent-based M-commerce applications., and . ISCC, page 399-406. IEEE Computer Society, (2004)A Distributed Reputation Management Scheme for Mobile Agent-Based E-Commerce Applications ., and . EEE, page 270-275. IEEE Computer Society, (2005)Dynamic Adaptive Mechanism in Learning Management System Based on Learning Styles., , and . ICALT, page 215-217. IEEE Computer Society, (2011)