Author of the publication

Generating Digital Signatures on Mobile Devices.

, , and . AINA (2), page 532-535. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A watermarking scheme based on rotating vector for image content authentication., , , and . Soft Comput., 24 (8): 5755-5772 (2020)Word sense disambiguation based on positional weighted context., , , and . J. Inf. Sci., 39 (2): 225-237 (2013)Algorithm for recommending answer providers in community-based question answering., , , , , and . J. Inf. Sci., 38 (1): 3-14 (2012)A Scheduling Approach with Respect to Overlap of Computing and Data Transferring in Grid Computing., , and . GCC (2), volume 3033 of Lecture Notes in Computer Science, page 105-112. Springer, (2003)Internet Based Electronic Business Framework Applications and Business to Business Standards., and . ISEC, volume 2040 of Lecture Notes in Computer Science, page 158-169. Springer, (2001)Two Improved Multi-server Authentication Protocols Based on Hash Function and Smart Card., and . J. Networks, 5 (12): 1434-1441 (2010)Research of architecture for grid manufacturing., , and . CSCWD (1), page 345-349. IEEE Computer Society, (2005)A two step method to recover occluded part of face., , , and . ICIS, page 169-173. IEEE, (2010)Semantic Approach for e-learning System., and . IMSCCS (2), page 442-446. IEEE Computer Society, (2006)0-7695-2581-4.A Comprehensive RMS Model for P2P e-Commerce Communities., , , and . IAT Workshops, page 320-323. IEEE Computer Society, (2006)