Author of the publication

Applying Security Engineering to Build Security Countermeasures: An Introduction.

, and . PARA, volume 3732 of Lecture Notes in Computer Science, page 957-963. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks., , and . IWCMC, page 1193-1198. IEEE, (2015)At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid., , , and . IWCMC, page 1067-1072. IEEE, (2019)A novel Approach for Privacy-Preserving Data Aggregation in Smart Grid., , , and . IWCMC, page 1060-1066. IEEE, (2019)A novel adaptive streaming approach for cloud-based mobile video games., , and . IWCMC, page 1072-1077. IEEE, (2017)A novel privacy technique for Augmented Reality cloud gaming based on image authentication., , and . IWCMC, page 252-257. IEEE, (2017)Machine Learning-Based Soccer Video Summarization System., , , and . FGIT-MulGraB (2), volume 263 of Communications in Computer and Information Science, page 19-28. Springer, (2011)Engaging and Effective Asynchronous Online Discussion Forums., and . FGIT-ASEA/DRBC/EL, volume 257 of Communications in Computer and Information Science, page 695-705. Springer, (2011)A Comparison Study between AntOR-Disjoint Node Routing and AntOR-Disjoint Link Routing for Mobile Ad Hoc Networks., , , and . FGIT-MulGraB (2), volume 263 of Communications in Computer and Information Science, page 300-304. Springer, (2011)Analysis of Handwritten Signature Image., , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 43-50. Springer, (2009)A Key Management Scheme for IoT-Based Video Surveillance Systems Based on Fingerprints., , and . WETICE, page 100-105. IEEE Computer Society, (2018)