Author of the publication

The Grid Intelligent Planning Framework: Planning Electric Utility Investments in a Time of Accelerating Change.

, , and . HCI (10), volume 6770 of Lecture Notes in Computer Science, page 205-214. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties., , , , and . INFOCOM, page 136-144. IEEE, (2014)The Grid Intelligent Planning Framework: Planning Electric Utility Investments in a Time of Accelerating Change., , and . HCI (10), volume 6770 of Lecture Notes in Computer Science, page 205-214. Springer, (2011)A Generalization of the Bent-Function Sequence Construction., , and . ISNN (3), volume 5553 of Lecture Notes in Computer Science, page 557-566. Springer, (2009)A Multiple Secret Sharing Scheme based on Matrix Projection., , and . COMPSAC (1), page 400-405. IEEE Computer Society, (2009)A New Approach to Weighted Multi-Secret Sharing., , , , , and . ICCCN, page 1-6. IEEE, (2011)Active User Authentication for Mobile Devices., , , and . WASA, volume 7405 of Lecture Notes in Computer Science, page 540-548. Springer, (2012)An Efficient Time-Bound Access Control Scheme for Dynamic Access Hierarchy., , , , and . MSN, page 279-286. IEEE Computer Society, (2009)A New Scheme for Anonymous Secure Group Communication., , , , and . HICSS, page 1-9. IEEE Computer Society, (2011)Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method., , , and . IEEE Trans. Computers, 63 (4): 902-916 (2014)Biometrics-Based Authentication: A New Approach., , and . ICCCN, page 1-6. IEEE, (2011)