Author of the publication

Affective Design Approach to Mobile Security Authentication.

, , , and . IHSED, volume 876 of Advances in Intelligent Systems and Computing, page 554-559. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel 4-DoF Robotic Link Mechanism with E-CoSMo: Kinematics Based Torque Analysis., , , and . IROS, page 3577-3582. IEEE, (2019)Interaction Modalities for Notification Signals in Augmented Reality., , , , and . ICMI, page 470-477. ACM, (2021)Throughput enhancement based on optimum transmission range in MANETs., , and . ICUFN, page 267-272. IEEE, (2014)Bayesian Analysis of Proportional Hazard Models, and . The Annals of Statistics, 31 (2): 493--511 (2003)A Decision-Support System to Improve Damage Survivability of Submarine., , and . IEA/AIE, volume 2358 of Lecture Notes in Computer Science, page 403-413. Springer, (2002)Potential Field Based Hierarchical Structure for Mobile Sensor Network Deployment., , and . ACC, page 5946-5951. IEEE, (2007)PiF: in-flash acceleration for data-intensive applications., , , , and . HotStorage, page 106-112. ACM, (2022)Topology Discovery in Large Ethernet Mesh Networks., , and . IEICE Trans. Commun., 89-B (1): 66-75 (2006)Clock Synchronization for One-Way Delay Measurement: A Survey., , , , and . ACN, volume 199 of Communications in Computer and Information Science, page 1-10. Springer, (2011)Using fuzzy logic for localization in mobile sensor networks: simulations and experiments., , and . ACC, page 1-6. IEEE, (2006)