Author of the publication

Efficient security credential management for named data networking.

. Int. J. Comput. Sci. Eng., 19 (2): 251-258 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary clustering with DBSCAN., , and . ICNC, page 923-928. IEEE, (2013)Millimeter-Wave Radar Monitoring for Elder's Fall Based on Multi-View Parameter Fusion Estimation and Recognition., , , , , , , and . Remote. Sens., 15 (8): 2101 (April 2023)Food Web Chaos without Subchain oscillators., and . Int. J. Bifurc. Chaos, 15 (11): 3481-3492 (2005)On the spectral radius, energy and Estrada index of the arithmetic-geometric matrix of a graph., , , and . Discret. Math. Algorithms Appl., 14 (2): 2150108:1-2150108:20 (2022)The ρ--moments of vertex-weighted graphs., , , and . Appl. Math. Comput., (2021)C-NMSP: A High Performance Network Management Service Platform for Complex Event Processing., , and . FGCN (1), page 7-10. IEEE Computer Society, (2008)Outlier detection via sampling ensemble., , , and . IEEE BigData, page 726-735. IEEE Computer Society, (2016)One-Dimensional Deep Image Prior for Curve Fitting of S-Parameters from Electromagnetic Solvers., , , , , , , , , and . ICCAD, page 1-9. IEEE, (2023)O-MAP: A per-component online anomaly predicting method for Cloud infrastructure., , , and . ICIA, page 3026-3031. IEEE, (2015)A MapReduce and Information Compression Based Social Community Structure Mining Method., , , , , and . CSE, page 971-980. IEEE Computer Society, (2013)