Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security from the transparent computing aspect., , , and . ICNC, page 216-220. IEEE, (2014)Performance Evaluation of Hypervisors and the Effect of Virtual CPU on Performance., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 772-779. IEEE, (2018)Outsourcing privacy-preserving social networks to a cloud., , , , and . INFOCOM, page 2886-2894. IEEE, (2013)Graded Reasoning in n -Valued Lukasiewicz Propositional Logic., and . AWIC, volume 43 of Advances in Soft Computing, page 387-391. Springer, (2007)Effective Query Grouping Strategy in Clouds., , , and . J. Comput. Sci. Technol., 32 (6): 1231-1249 (2017)Dependable Structural Helath Monitoring Using Wireless Sensor Networks., , , and . CoRR, (2015)FlowTrust: trust inference with network flows., and . Frontiers Comput. Sci. China, 5 (2): 181-194 (2011)Scheduling Algorithm for Area Coverage Problem in Directional Sensor Networks., , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 356-363. IEEE, (2018)Naturalistic driving data for a smart cloud-based abnormal driving detector., , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1-8. IEEE, (2017)Enabling Cooperative Privacy-preserving Personalized search in cloud environments., , and . Inf. Sci., (2019)