Author of the publication

Single Sign-On Demystified: Security Considerations for Developers and Users.

, and . WorldCIST (2), volume 746 of Advances in Intelligent Systems and Computing, page 185-196. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Logarithmic expected packet delivery delay in mobile ad hoc wireless networks., and . Wirel. Commun. Mob. Comput., 4 (3): 281-287 (2004)Study of long-duration MPEG-trace segmentation methods for developing frame-size-based traffic models., , and . Comput. Networks, 44 (2): 177-188 (2004)Single Sign-On Demystified: Security Considerations for Developers and Users., and . WorldCIST (2), volume 746 of Advances in Intelligent Systems and Computing, page 185-196. Springer, (2018)Detection of Good and Bad Sensor Nodes in the Presence of Malicious Attacks and Its Application to Data Aggregation., , and . IEEE Trans. Signal and Information Processing over Networks, 4 (3): 549-563 (2018)Product networks: a family of symmetric interconnection networks from a group model., and . Int. J. Comput. Math., 73 (2): 183-200 (1999)Systolic algorithms for the dynamic programming problem., and . Int. J. Comput. Math., 41 (3-4): 151-163 (1992)Extended colored Petri net: An efficient tool for analyzing concurrent systems., , , and . Inf. Sci., 54 (3): 191-218 (1991)Back-propagation algorithm with controlled oscillation of weights., and . ICNN, page 21-26. IEEE, (1993)Traffic models for MPEG-4 spatial scalable video., , and . GLOBECOM, page 5. IEEE, (2005)Technique for lossless compression of color images based on hierarchical prediction, inversion, and context adaptive coding., , , and . J. Electronic Imaging, 28 (5): 053007 (2019)