Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A low energy adaptive clustering multi-hop routing protocol based on fuzzy decision., , , , and . J. Intell. Fuzzy Syst., 29 (6): 2547-2554 (2015)Research and Development of Trust Mechanism in Cloud Computing., , , and . ICCCS, volume 9483 of Lecture Notes in Computer Science, page 218-229. Springer, (2015)Semantics-based Access Control Approach for Web Service., , , , and . J. Comput., 6 (6): 1152-1161 (2011)Efficient Model-based Fuzz Testing Using Higher-order Attribute Grammars., , , , and . J. Softw., 8 (3): 645-651 (2013)Semantic Security Policy for Web Service., , , and . ISPA, page 258-262. IEEE Computer Society, (2009)Icefex: Protocol Format Extraction from IL-based Concolic Execution., , , , , and . KSII Trans. Internet Inf. Syst., 7 (3): 576-599 (2013)A Parallel Intrusion Detection System for High-Speed Networks., , , , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 439-451. Springer, (2004)Double Reversible Watermarking Algorithm for Image Tamper Detection., , , , and . J. Inf. Hiding Multim. Signal Process., 7 (3): 530-542 (2016)Using Semantic Web Techniques to Implement Access Control for Web Service., , , , and . ICICA (1), volume 105 of Communications in Computer and Information Science, page 258-266. Springer, (2010)