Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Analysis of a Generalized Architecture for Reconfigurable m-ary Tree Structures., and . IEEE Trans. Computers, 41 (11): 1465-1478 (1992)An Evaluation of SingleTapBraille Keyboard: A Text Entry Method that Utilizes Braille Patterns on Touchscreen Devices., and . ASSETS, page 161-169. ACM, (2016)Butterfly Encryption Scheme for Resource-Constrained Wireless Networks., and . Sensors, 15 (9): 23145-23167 (2015)DDoS Attack Detection System: Utilizing Classification Algorithms with Apache Spark., , and . NTMS, page 1-7. IEEE, (2018)A mobile role-based access control system using identity-based encryption with zero knowledge proof., , and . CISDA, page 1-7. IEEE, (2012)Energy-Balancing Unequal Clustering Approach to Reduce the Blind Spot Problem in Wireless Sensor Networks (WSNs)., , and . Sensors, 18 (12): 4258 (2018)Test Suite for Vulnerability Analysis of RFID Systems., , , , , , , and . ICWN, page 70-75. CSREA Press, (2010)Lightweight protocol for anonymity and mutual authentication in RFID systems., , and . CCNC, page 910-915. IEEE, (2015)Backward connection preemption in multiclass QoS-aware networks., and . IWQoS, page 153-160. IEEE, (2004)Further Improvements of Fast Encryption Algoirthm for Multimedia., and . Int. J. Netw. Secur., 7 (2): 187-192 (2008)