Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bio-CAPTCHA Voice-Based Authentication Technique for Better Security and Usability in Cloud Computing., , , and . IJSSMET, 11 (2): 59-79 (2020)An Enhanced DNA-based Steganography Technique with a Higher Hiding Capacity., , and . BIOINFORMATICS, page 150-157. SciTePress, (2015)ESSAC: Enhanced Scalable Secure Access Control Framework for Cloud Storage., , and . ICFNDS, page 24:1-24:8. ACM, (2017)Wireless Access Point Voice Capacity Analysis and Enhancement Based on Clients' Spatial Distribution., , , and . IEEE Trans. Veh. Technol., 58 (5): 2597-2603 (2009)Integrated QoS Utility-Based Model for Cloud Computing Service Provider Selection., , , and . COMPSAC Workshops, page 45-50. IEEE Computer Society, (2012)Efficient Scheduler for the Growing VoIP Traffic., , and . ICPP Workshops, page 12. IEEE Computer Society, (2007)A Novel Mobile-Cloud based Healthcare Framework for Diabetes., and . HEALTHINF, page 262-269. SciTePress, (2014)Designing an Innovative Computer Networking Course Using Junosphere., and . UKSim, page 182-188. IEEE, (2014)Hybrid Packet-Pheromone-Based Probabilistic Routing for Mobile Ad Hoc Networks., , , and . IEICE Trans. Commun., 92-B (8): 2610-2618 (2009)Enhancing Mobile Devices Capabilities in Low Bandwidth Networks with Cloud Computing., , and . AMLTA, volume 488 of Communications in Computer and Information Science, page 97-108. Springer, (2014)