Author of the publication

Security Analysis for Internet Banking Models.

, , and . SNPD (3), page 1141-1146. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Security Threats Classification Pyramid., , , and . AINA Workshops, page 208-213. IEEE Computer Society, (2010)How confident are you to counter uncertainty?, , and . SECURIT, page 116-125. ACM, (2012)Mobile agents for network management: when and when not!, , and . SAC, page 47-53. ACM, (2005)On the commonality of iris biometrics., , and . MoMM, page 19-25. ACM, (2011)Mobile Division Query Processing Incorporating Multiple Non-Collaborative Servers., , and . Int. J. Bus. Data Commun. Netw., 5 (3): 67-90 (2009)Reduct-Based Result Set Fusion for Relevance Feedback in CBIR., , and . ACIS-ICIS, page 918-923. IEEE Computer Society, (2007)Adaptive and Efficient Data Dissemination in Mobile P2P Environments., , , , and . AINA Workshops, page 861-866. IEEE Computer Society, (2011)Condition for bifurcation of the region of attraction in linear planar systems with saturated linear feedback., , , and . CDC, page 3918-3923. IEEE, (2002)Interplay between identification and optimization in run-to-run optimization schemes., and . ACC, page 2174-2179. IEEE, (2002)Convergence analysis of iterative identification and optimization schemes., and . ACC, page 1956-1960. IEEE, (2003)