Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Voronoi-based Secure kNN Queries over Spatial Data at the Cloud., , , and . IIT, page 13-17. IEEE, (2018)Extending steganography payload capacity using the L*a*b* color space., , and . IIT, page 1-6. IEEE, (2018)On protecting the integrity of sensor data., , and . ICECS, page 902-905. IEEE, (2008)A Survey on Using Blockchain in Trade Supply Chain Solutions., , and . IEEE Access, (2019)Customs-Based Distributed Risk Assessment Method., , and . PAAP, volume 1163 of Communications in Computer and Information Science, page 417-429. Springer, (2019)NILE-PDT: A Phenomenon Detection and Tracking Framework for Data Stream Management Systems., , , , , , and . VLDB, page 1295-1298. ACM, (2005)A novel memory management scheme for residential gateways., and . Inf. Syst. Frontiers, 11 (5): 491-500 (2009)Managing multi-priority services in ubiquitous computing applications., , and . Int. J. Internet Protoc. Technol., 5 (3): 154-165 (2010)Achieving Stronger Compaction for DCT-Based Steganography: A Region-Growing Approach., , and . WorldCIST (2), volume 1160 of Advances in Intelligent Systems and Computing, page 251-261. Springer, (2020)FogLBS: Utilizing fog computing for providing mobile Location-Based Services to mobile customers., , and . Pervasive Mob. Comput., (August 2023)