Author of the publication

Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication.

, , , and . Int. J. Inf. Secur. Priv., 1 (1): 35-46 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prosumer recruitment framework for prosumer community groups in smart-grid., , , , and . Comput. Syst. Sci. Eng., (2013)Open Source Software Development (OSSD) Based On Software Engineering., , and . OSS, volume 203 of IFIP, page 345-346. Springer, (2006)LCART: Lightweight Congestion Aware Reliable Transport Protocol for WSN Targeting Heterogeneous Traffic., , and . Aust. J. Intell. Inf. Process. Syst., (2010)Spam 2.0: The Problem Ahead., , , , , , and . ICCSA (2), volume 6017 of Lecture Notes in Computer Science, page 400-411. Springer, (2010)Survey of Interoperability in Electronic Health Records Management and Proposed Blockchain Based Framework: MyBlockEHR., , , and . IEEE Access, (2021)Impact of Nepotism on the Human Resources Component of ERP Systems Implementation in Lebanon., , , and . ICBDS, volume 1210 of Communications in Computer and Information Science, page 116-134. Springer, (2019)Business sustainability frameworks a survey., and . SERA, page 171-177. IEEE Computer Society, (2016)Waste management strategies for Software Development companies: An explorative text analysis of business sustainability reports., and . SERA, page 179-184. IEEE Computer Society, (2016)Prioritizing Information for Achieving QoS Control in WSN., , and . AINA, page 835-842. IEEE Computer Society, (2010)Key Parameters in Identifying Cost of Spam 2.0., , , and . AINA, page 789-796. IEEE Computer Society, (2010)