Author of the publication

Hybrid app security protocol for high speed mobile communication.

, , , and . J. Supercomput., 72 (5): 1715-1739 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study on the Designing of a Laboratory Accident Cognition Model Using Smart Sensor Based Decision Tree., , , and . CSA/CUTE, volume 474 of Lecture Notes in Electrical Engineering, page 187-191. Springer, (2017)Hybrid app security protocol for high speed mobile communication., , , and . J. Supercomput., 72 (5): 1715-1739 (2016)Real-time tracking of moving objects from scattering matrix in real-world microwave imaging., , and . CoRR, (2024)A Study on User Authorization for Grid Resources., , and . J. Inform. and Commun. Convergence Engineering, 2 (2): 128-131 (2004)Fulltext-Image Watermarking Using Improved DWT and HVS Based on JPEG Compression., , , and . AWIC, volume 3528 of Lecture Notes in Computer Science, page 254-259. Springer, (2005)An In-depth Analysis of Spam and Spammers, , and . CoRR, (2010)A Study on Design Method of Synchronous Reluctance Motor Based on Nonlinear MEC Using Newton-Raphson Method., , and . IEEE Access, (2023)Implementation of u-RPMS Using Google Chart in Hybrid Application for Visualization of Patient's Biometric Information., , , , , and . ICISA, page 1-4. IEEE, (2013)"Reminder: please update your details": Phishing Trends., , and . NetCoM, page 295-300. IEEE Computer Society, (2009)Study on IP Traceback System for DDoS., , and . ICEIS (3-1), page 279-282. (2008)