Author of the publication

Implementing a Peer-to-Peer Web Browser for Publishing and Searching Web Pages on Internet.

, , , and . AINA, page 754-761. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying quorum role in network management., , , , and . Integrated Network Management, page 591-597. IEEE, (2009)A multi-domain role activation model., , , and . ICC, page 1-6. IEEE, (2017)A Distributed IDS for Ad Hoc Networks., , and . AINA Workshops, page 478-483. IEEE Computer Society, (2012)Enabling Anomaly-based Intrusion Detection Through Model Generalization., , , and . ISCC, page 934-939. IEEE, (2018)Stream learning and anomaly-based intrusion detection in the adversarial settings., , , and . ISCC, page 773-778. IEEE Computer Society, (2017)How blockchains can improve measuring instruments regulation and control., , , , and . I2MTC, page 1-6. IEEE, (2018)An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT., , , and . GLOBECOM, page 1-6. IEEE, (2015)Integral Federated Identity Management for Cloud Computing., , , and . NTMS, page 1-5. IEEE, (2012)BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks., , , and . Future Gener. Comput. Syst., (2019)A Three-Ballot-Based Secure Electronic Voting System., , and . IEEE Secur. Priv., 6 (3): 14-21 (2008)