Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An extended optimal replacement model of systems subject to shocks., , , and . Eur. J. Oper. Res., 175 (1): 399-412 (2006)Optimal maintenance policy for a system subject to damage in a discrete time process., , and . Reliab. Eng. Syst. Saf., (2012)On the Revocation of Proxy Signatures.. IMECS, page 160-162. Newswood Limited, (2006)A Generic Approach to Improving Diffie-Hellman Key Agreement Efficiency for Thin Clients.. Comput. J., 59 (4): 592-601 (2016)Efficiently tracking TANET suspicious packets and identifying the devices using Splunk., , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 866-874. IOS Press, (2014)Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings.. IACR Cryptology ePrint Archive, (2006)Collaborative Modes on Collaborative Problem Solving., , , , , and . HCI (5), volume 9735 of Lecture Notes in Computer Science, page 3-10. Springer, (2016)Using Ontology to Establish Social Context and Support Social Reasoning., , , and . IVA, volume 3661 of Lecture Notes in Computer Science, page 344-357. Springer, (2005)A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security., , , and . GPC, volume 6104 of Lecture Notes in Computer Science, page 407-417. Springer, (2010)Innovative Applications and Security of Internet of Things., , and . IJDSN, (2014)