Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Clustering Analysis Based Trust Model in Grid Environment Supporting Virtual Organizations., and . AINA Workshops, page 100-105. IEEE Computer Society, (2008)A trust degree based access control in grid environments., , and . Inf. Sci., 179 (15): 2618-2628 (2009)A Trust Aware Access Control in Service Oriented Grid Environment., and . GCC, page 417-422. IEEE Computer Society, (2007)A clustering analysis and agent-based trust model in a grid environment supporting virtual organisations., and . IJWGS, 5 (1): 3-16 (2009)QoS Deviation Distance Based Negotiation Algorithm in Grid Resource Advance Reservation., , , and . CSCWD, page 605-610. IEEE, (2007)MPSL: A Mobile Phone-Based Physical-Social Location Verification System., , , , and . WASA, volume 7405 of Lecture Notes in Computer Science, page 488-499. Springer, (2012)A mobile phone-based physical-social location proof system for mobile social network service., , , , , , and . Secur. Commun. Networks, 9 (13): 1890-1904 (2016)Analysis of and defense against crowd-retweeting based spam in social networks., , , , , , and . World Wide Web, 22 (6): 2953-2975 (2019)Three-Layered Mediator Architecture Based on DHT., , , and . ISPAN, page 313-318. IEEE Computer Society, (2004)On crowd-retweeting spamming campaign in social networks., , , , , and . ICC, page 1-6. IEEE, (2016)