Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling Context-Adaptive Energy-Aware Security in Mobile Devices., , , and . LCN Workshops, page 105-109. IEEE, (2018)More Results on Experimental Evaluations of Some Algorithms for Block Sorting., , and . BIBE, page 105-110. IEEE, (2020)Towards designing and implementing a secure one time password (OTP) authentication system., , and . IPCCC, page 1-2. IEEE Computer Society, (2016)A Distributed Algorithm with Optimum Communication for Cyber Physical Systems: Multi-tank Process Case Study., , and . SysCon, page 1-7. IEEE, (2019)Secure Multi-Robot Adaptive Information Sampling., , , , , and . SSRR, page 125-131. IEEE, (2021)Block Sorting Is APX-Hard., and . CIAC, volume 9079 of Lecture Notes in Computer Science, page 377-389. Springer, (2015)Towards Designing Greener Secured Hash Functions., and . iThings/GreenCom/CPSCom, page 618-621. IEEE Computer Society, (2014)Energy Oriented Vulnerability Analysis on Authentication Protocols for CPS., and . DCOSS, page 367-371. IEEE Computer Society, (2014)Implementing algorithms for sorting by strip swaps., , and . BCB, page 76:1-76:9. ACM, (2022)Multi-Robot Information Gathering for Precision Agriculture: Current State, Scope, and Challenges., , , and . IEEE Access, (2021)