Author of the publication

A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection.

, , , and . ICEIS (4), page 57-62. (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Voronoi-Based Continuous k Nearest Neighbor Search in Mobile Navigation., , , , , , and . IEEE Trans. Ind. Electron., 58 (6): 2247-2257 (2011)Continuous range search based on network Voronoi diagram., , , , , and . Int. J. Grid Util. Comput., 1 (4): 328-335 (2009)Authentication in Ubiquitous Networking., and . Int. J. Inf. Secur. Priv., 9 (3): 57-83 (2015)Transformational Approach for Alignment-free Image Matching Applications., , , and . MoMM, page 49-57. ACM, (2017)Mobile service oriented architectures for NN-queries., , , and . J. Netw. Comput. Appl., 32 (2): 434-447 (2009)Predictive control of fast unstable and nonminimum-phase nonlinear systems., , , and . ACC, page 4764-4769. IEEE, (2002)Global optimization of three-input systems using multi-unit extremum seeking control., , and . ACC, page 2044-2049. IEEE, (2011)Proto-reduct Fusion Based Relevance Feedback in CBIR., , and . ICAPR, page 121-124. IEEE Computer Society, (2009)Security Analysis for Internet Banking Models., , and . SNPD (3), page 1141-1146. IEEE Computer Society, (2007)Global Index for Multi Channel Data Dissemination in Mobile Databases., , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 212-219. Springer, (2003)