Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Blockchain: An Architecture for CPSS-Based Smart Societies., , , and . IEEE Trans. Comput. Social Systems, 5 (2): 303-310 (2018)Automatic Web Service Detection in Oil and Gas., , and . FGIT-FGCN, volume 56 of Communications in Computer and Information Science, page 193-200. Springer, (2009)Authenticated health monitoring scheme for wireless body sensor networks., and . BODYNETS, page 31-35. ICST / ACM, (2012)Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography., , and . CloudCom, volume 5931 of Lecture Notes in Computer Science, page 167-177. Springer, (2009)Flexible building blocks for software defined network function virtualization., and . QSHINE, page 37-43. IEEE, (2014)Deployment models: Towards eliminating security concerns from cloud computing., , , and . HPCS, page 189-195. IEEE, (2010)Multi-tenant Network Monitoring Based on Software Defined Networking., and . OTM Conferences, volume 8185 of Lecture Notes in Computer Science, page 327-341. Springer, (2013)Improve Security Over Multiple Cloud Service Providers for Resource Allocation., , and . ICDIS, page 145-148. IEEE, (2018)Mobile contact synchronous with cloud server., , and . Appl. Soft Comput., (2017)Household Power Demand Prediction Using Evolutionary Ensemble Neural Network Pool with Multiple Network Structures., , and . Sensors, 19 (3): 721 (2019)