Author of the publication

A novel approach for re-authentication protocol using personalized information.

, , , , and . ICMLC, page 1826-1829. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps., , , and . TrustCom/BigDataSE/ISPA (1), page 1014-1021. IEEE, (2015)DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA against the Third Party Human Attacks., , , , and . TAAI, page 158-163. IEEE Computer Society, (2013)Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural Network., , , and . ICACT, page 533-538. IEEE, (2019)How to solve collision and authentication issues using RFID protocol technology., , , , and . ICMLC, page 454-460. IEEE, (2011)Android privacy., , , , and . ICMLC, page 1830-1837. IEEE, (2012)ChainSpot: Mining Service Logs for Cyber Security Threat Detection., , , , and . Trustcom/BigDataSE/ISPA, page 1867-1874. IEEE, (2016)Detecting Spam on Twitter via Message-Passing Based on Retweet-Relation., , , , and . TAAI, volume 8916 of Lecture Notes in Computer Science, page 56-65. Springer, (2014)Android Malware Detection via a Latent Network Behavior Analysis., , , , , and . TrustCom, page 1251-1258. IEEE Computer Society, (2012)RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis., , , , , , and . TrustCom, page 1370-1375. IEEE Computer Society, (2012)Clustering of Similar Malware Behavior via Structural Host-Sequence Comparison., , , and . COMPSAC, page 349-358. IEEE Computer Society, (2013)