Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel technique for image steganography based on a high payload method and edge detection., , and . Expert Syst. Appl., 39 (14): 11517-11524 (2012)A qualitative analysis of software security patterns., , and . Comput. Secur., 25 (5): 379-392 (2006)Pairing-Based Cryptography on the Internet of Things: A Feasibility Study., , , , and . WWIC, volume 10866 of Lecture Notes in Computer Science, page 219-230. Springer, (2018)Attacks on the AKACP Protocol., , , , and . IACR Cryptology ePrint Archive, (2010)A Provably Secure One-Pass Two-Party Key Establishment Protocol., , , , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 108-122. Springer, (2007)Matching Disparate Views of Planar Surfaces Using Projective Invariants., , and . BMVC, page 1-11. British Machine Vision Association, (1998)Design Pattern Detection Using Similarity Scoring., , , and . IEEE Trans. Software Eng., 32 (11): 896-909 (2006)Quantitative Evaluation of Systems with Security Patterns Using a Fuzzy Approach., , and . OTM Workshops (1), volume 4277 of Lecture Notes in Computer Science, page 554-564. Springer, (2006)Matching disparate views of planar surfaces using projective invariants., , and . Image Vis. Comput., 18 (9): 673-683 (2000)A Qualitative Evaluation of Security Patterns., , and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 132-144. Springer, (2004)