Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electroluminescent properties of polyN, N′-bis(4-butylphenyl)-N, N′-bis(phenyl)benzidine doped with 1, 3, 5-Tris(1-phenyl-1H-benzimidazol-2-yl)benzene., , , , , , , and . Displays, (2015)A new fault tolerant SVPWM strategy for multilevel converters., , , and . IECON, page 4440-4445. IEEE, (2014)Design of a structure-controlled variable stiffness actuator based on rotary flexure hinges., , and . ICRA, page 45-50. IEEE, (2017)Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud., , and . ICCCS (2), volume 10603 of Lecture Notes in Computer Science, page 268-279. Springer, (2017)The Artificial Neural Networks Based on Scalarization Method for a Class of Bilevel Biobjective Programming Problem., , , and . Comput. Intell. Neurosci., (2017)Eclipse: Practicability Beyond 1NN and Skyline., , , and . CoRR, (2017)A Variable Stiffness Robotic Gripper Based on Structure-Controlled Principle., , , and . IEEE Trans Autom. Sci. Eng., 15 (3): 1104-1113 (2018)Secure and Efficient Skyline Queries on Encrypted Data., , , and . IEEE Trans. Knowl. Data Eng., 31 (7): 1397-1411 (2019)Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services - Authorized Access to Healthcare Services., , and . J. Medical Systems, 44 (1): 6:1-6:9 (2020)An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password., , , and . ICCCS (1), volume 10039 of Lecture Notes in Computer Science, page 421-431. (2016)