Author of the publication

A Transparent Encryption Scheme of Video Data for Android Devices.

, , , , and . CSE/EUC (1), page 817-822. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The robust joint solution for channel assignment and routing for wireless mesh networks with time partitioning., and . Ad Hoc Networks, (2014)Examining Competitive Intelligence Using External and Internal Data Sources: A Text Mining Approach., , and . AMCIS, Association for Information Systems, (2015)Flight Risk Probabilities During Wake Encountering Using Multivariate Copula Model., , , and . FSDM, volume 281 of Frontiers in Artificial Intelligence and Applications, page 200-205. IOS Press, (2015)Biometric verification using hand vein-patterns.. WCNIS, page 677-681. IEEE, (2010)The impact of topology in robust routing on wireless mesh networks., and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 14 (4): 46-48 (2010)Illumination Normalization Based on Homomorphic Wavelet Filtering for Face Recognition., , and . J. Inf. Sci. Eng., 29 (3): 579-594 (2013)Optimal Resource Allocation in Wireless Ad Hoc Networks: A Price-Based Approach., , and . IEEE Trans. Mob. Comput., 5 (4): 347-364 (2006)Ensemble sufficient dimension folding methods for analyzing matrix-valued data., , and . Comput. Stat. Data Anal., (2016)Efficient computation offloading for Internet of Vehicles in edge computing-assisted 5G networks., , , , and . J. Supercomput., 76 (4): 2518-2547 (2020)Hierarchical control of multiple resources in distributed real-time and embedded systems., , , , and . Real Time Syst., 39 (1-3): 237-282 (2008)