Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services., , and . SEC, volume 214 of IFIP Conference Proceedings, page 239-250. Kluwer, (2002)Secure M-commerce Transactions: A Third Party Based Signature Protocol., , , and . IAS, page 3-8. IEEE Computer Society, (2007)Versatile Real-Time Motion Synthesis via Kino-Dynamic MPC with Hybrid-Systems DDP., , , and . CoRR, (2022)A reliable probabilistic risk-based decision-making method: Bayesian Technique for Order of Preference by Similarity to Ideal Solution (B-TOPSIS)., , , and . Soft Comput., 26 (22): 12137-12153 (2022)Emotion transfer for images based on color combinations., , and . CoRR, (2013)Research on lifetime prediction-based recharging scheme in rechargeable WSNs., , , , , , and . NOMS, page 1-4. IEEE, (2018)Fault-tolerant topology control for heterogeneous wireless sensor networks using Multi-Routing Tree., , , , and . IM, page 620-623. IEEE, (2017)Dynamic Graph Repartitioning: From Single Vertex to Vertex Group., , , , and . DASFAA (2), volume 12113 of Lecture Notes in Computer Science, page 482-497. Springer, (2020)Propagation of computer virus both across the Internet and external computers: A complex-network approach., , , , , and . Commun. Nonlinear Sci. Numer. Simul., 19 (8): 2785-2792 (2014)Gravitation-Based 3-D Redeployment Schemes for the Mobile Sensors and Sink in Gas Leakage Monitoring., , , , and . IEEE Access, (2017)