Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Overlay Structure Based on Virtual Node., , , , and . ISCC, page 1091-1098. IEEE Computer Society, (2007)Exploiting Consumer Reviews for Product Feature Ranking., , , and . J. Comput. Sci. Technol., 27 (3): 635-649 (2012)Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks., , , , and . Euro-Par, volume 5168 of Lecture Notes in Computer Science, page 601-610. Springer, (2008)CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks., , , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 203-215. Springer, (2007)Secure Information Flow in Java via Reachability Analysis of Pushdown System., , and . QSIC, page 142-150. IEEE Computer Society, (2010)Automatic Data Extraction from Web Discussion Forums., , , and . FCST, page 219-225. IEEE Computer Society, (2009)Securing key issuing in peer-to-peer networks., , , , , , and . SAC, page 84-85. ACM, (2009)On key issuing privacy in distributed online social networks., , , and . FSKD, page 2497-2501. IEEE, (2012)TSearch: A Self-learning Vertical Search Spider for Travel., , , and . ICYCS, page 348-353. IEEE Computer Society, (2008)Enforcing Reactive Noninterference with Reachability Analysis., , and . ITNG, page 321-326. IEEE Computer Society, (2011)