Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Countering Wrapping Attack on XML Signature in SOAP Message for Cloud Computing., and . CoRR, (2013)Special issue on trust and security in wireless sensor networks., , , , , and . Concurr. Comput. Pract. Exp., 27 (15): 3791-3793 (2015)Building discriminative features of scene recognition using multi-stages of inception-ResNet-v2., , and . Appl. Intell., 53 (15): 18431-18449 (August 2023)Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc Network., , and . SIN, page 166. ACM, (2014)Mechanisms of Parallel Computing Organization for NeuroCluster., , , , and . PaCT, volume 2127 of Lecture Notes in Computer Science, page 181-185. Springer, (2001)Investigation of Hill Cipher Modifications Based on Permutation and Iteration, and . CoRR, (2012)Image scene geometry recognition using low-level features fusion at multi-layer deep CNN., , and . Neurocomputing, (2021)NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks., , , , , and . Sensors, 20 (16): 4632 (2020)Parallel SPMD-Tasks Graph Description Language for Network Clusters., , and . PaCT, volume 2127 of Lecture Notes in Computer Science, page 186-189. Springer, (2001)Hill cipher modification based on eigenvalues HCM-EE., and . SIN, page 164-167. ACM, (2009)