Author of the publication

Welcome message from FINGNet-2013 international workshop organizers

, , , , and . Proceedings-7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013, page 51. (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Welcome message from FINGNet-2012 international workshop organizers, , , , and . Proceedings-6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012, (2012)Welcome message from FINGNet-2013 international workshop organizers, , , , and . Proceedings-7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013, page 51. (2013)Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network., , and . HPCC, volume 4208 of Lecture Notes in Computer Science, page 280-289. Springer, (2006)Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks., , , and . ICCSA (4), volume 3983 of Lecture Notes in Computer Science, page 440-447. Springer, (2006)Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS., , and . ICACT, page 63-67. IEEE, (2018)Performance evaluation of FDDI network and interconnected heterogeneous networks., and . LCN, page 75-83. IEEE Computer Society, (1990)Authentication for Mobile Open IPTV Service Security., , and . IMIS, page 381-385. IEEE Computer Society, (2016)Securing information flow in content delivery networks with visual and quantum cryptography., , and . ICOIN, page 463-468. IEEE Computer Society, (2016)Data aggregation using temporal and spatial correlations in Advanced Metering Infrastructure., and . ICOIN, page 541-544. IEEE Computer Society, (2014)A Key Management Based on Multiple Regression in Hierarchical Sensor Network., , and . WISA, volume 4298 of Lecture Notes in Computer Science, page 267-281. Springer, (2006)