Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks., , , , and . ICCCN, page 185-190. IEEE, (2008)New Results on Erasure Combinatorial Batch Codes., , , and . Allerton, page 1-6. IEEE, (2023)Real Time Traffic Sign Detection Using Color and Shape-Based Features., , , and . ACIIDS (2), volume 5991 of Lecture Notes in Computer Science, page 268-278. Springer, (2010)PEQ: A Privacy-Preserving Scheme for Exact Query Evaluation in Distributed Sensor Data Networks., , , and . SRDS, page 189-198. IEEE Computer Society, (2009)Determining Quality of S-Boxes Using Pseudo Random Sequences Generated from Stream Ciphers., and . ICA3PP (2), volume 7440 of Lecture Notes in Computer Science, page 72-79. Springer, (2012)Registration of 3D Range Images Using Particle Swarm Optimization., , and . ASIAN, volume 3321 of Lecture Notes in Computer Science, page 223-235. Springer, (2004)Supporting Formation and Operation of Virtual Organisations in a Grid Environment, , , , , , , , , and 8 other author(s). Proceedings of the UK e-Science All Hands Meeting 2004, page 376-383. Nottingham, UK, (2004)Privacy-Preserving for Web Hosting., , , and . INISCOM, volume 334 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 314-323. Springer, (2020)Delivering Services by Building and Running VIrtual Organisations,, , , , , , , , , and 7 other author(s). BT Technology Journal, 24 (1): 141--152 (January 2006)Hierarchical Spatial Matching Kernel for Image Categorization., , , , and . ICIAR (1), volume 6753 of Lecture Notes in Computer Science, page 141-151. Springer, (2011)