Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discuss and Analyze by AHP Techniques the KSF of Managing the NMMBA under the BOT Model., , and . ICCCI (1), volume 6421 of Lecture Notes in Computer Science, page 444-456. Springer, (2010)Asynchronous Design of Modular Multiplication Using Adaptive Radix Computation., , , and . APCCAS, page 606-609. IEEE, (2006)Using condition flag prediction to improve the performance of out-of-order processors., , and . ISCAS, page 1240-1243. IEEE, (2013)Efficient scissoring scheme for scanline-based rendering of 2D vector graphics., , , , , and . ISCAS, page 766-769. IEEE, (2012)Fast scalable radix-4 Montgomery modular multiplier., , , and . ISCAS, page 3049-3052. IEEE, (2012)High-speed modular multiplication design for public-key cryptosystems., , , and . ISCAS, page 680-683. IEEE, (2008)Exploration of Low-Cost Configurable S-Box Designs for AES Applications., , , , and . ICESS, page 422-428. IEEE Computer Society, (2008)Processor shield for L1 data cache software-based on-line self-testing., and . ASP-DAC, page 420-425. IEEE, (2017)Examining academic landscape of mobile banking - the lens from main paths., , , and . Int. J. Mob. Commun., 18 (2): 131-157 (2020)Relationship quality, computer auditing and information security for mobile industry., , and . Int. J. Mob. Commun., 18 (4): 405-419 (2020)