Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reasoning crypto ransomware infection vectors with Bayesian networks., , and . ISI, page 149-151. IEEE, (2017)Accelerating and tuning small matrix multiplications on Sunway TaihuLight: A case study of spectral element CFD Code Nek5000., , , , , , and . Int. J. High Perform. Comput. Appl., (2020)Practical and secure multifactor authentication protocol for autonomous vehicles in 5G., , , , , and . Softw. Pract. Exp., 54 (10): 1852-1869 (2024)Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol., , , and . Wireless Personal Communications, 42 (1): 49-62 (2007)An overview: multiscale simulation in understanding the radiation damage accumulation of reactor materials., , , , , , , and . Simul., (2021)Velocity-Dependent Nearest Neighbor Query., , , , , and . APWeb/WAIM (2), volume 12859 of Lecture Notes in Computer Science, page 351-367. Springer, (2021)Web Service Testing Tools: A Comparative Study., , , and . CoRR, (2013)Blockchain Framework for Healthcare Data Management System in Clinical Trials., , and . FSDM, volume 378 of Frontiers in Artificial Intelligence and Applications, page 824-832. IOS Press, (2023)A blockchain-enabled privacy-preserving authentication management protocol for Internet of Medical Things., , , , and . Expert Syst. Appl., 237 (Part A): 121329 (March 2024)A UAV-Assisted Authentication Protocol for Internet of Vehicles., , , , , and . IEEE Trans. Intell. Transp. Syst., 25 (8): 10286-10297 (August 2024)