Author of the publication

Evolution of cooperation in reputation system by group-based scheme.

, , , , and . J. Supercomput., 63 (1): 171-190 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Intrusion Detection System at User Level with System-Call Interposing., and . ICETE (2), page 263-268. INSTICC Press, (2004)A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository., and . IWAP, volume 128 of Frontiers in Artificial Intelligence and Applications, page 155-168. IOS Press, (2005)An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme., , and . WWW (Posters), (2003)Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network., , , and . J. Networks, 7 (1): 88-100 (2012)Fault tolerant scheduling with dynamic number of replicas in heterogeneous system., , , and . HPCC, page 434-441. IEEE, (2010)A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks., and . ITW, page 175-178. IEEE, (2003)Handling class Imbalance problem in Intrusion Detection System based on deep learning., , and . Int. J. Netw. Comput., 12 (2): 467-492 (2022)A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks., , , , and . Comput. Commun., 35 (17): 2125-2137 (2012)A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm., and . PQCrypto, volume 7071 of Lecture Notes in Computer Science, page 275-294. Springer, (2011)Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it., , and . ISAAC, volume 1533 of Lecture Notes in Computer Science, page 59-68. Springer, (1998)