Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Enhanced Authentication Protocol for RFID Systems., , , , , , , and . IEEE Access, (2020)Impact of Community Structure on Consensus Machine Learning., , and . CoRR, (2020)A Novel Approach for Mining Closed Clickstream Patterns., , , , , , and . Cybern. Syst., 52 (5): 328-349 (2021)A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments., , , , , , , and . IEEE Access, (2020)Constraint-Based Method for Mining Colossal Patterns in High Dimensional Databases., , , , and . ISAT (1), volume 655 of Advances in Intelligent Systems and Computing, page 195-204. Springer, (2017)An Efficient Method for Mining Clickstream Patterns., , , , and . IJCSR, volume 11103 of Lecture Notes in Computer Science, page 572-583. Springer, (2018)An efficient method for mining frequent sequential patterns using multi-Core processors., , and . Appl. Intell., 46 (3): 703-716 (2017)An Efficient Parallel Method for Mining Frequent Closed Sequential Patterns., , and . IEEE Access, (2017)Mining Weighted Sequential Patterns Based on Prefix-Tree and Prism Encoding., , , , and . Vietnam. J. Comput. Sci., 10 (3): 357-372 (August 2023)A New Strong Adversary Model for RFID Authentication Protocols., , , , , , and . IEEE Access, (2020)