Author of the publication

Heads-down tribes across four Asian countries: antecedents of smartphone addiction.

, , , and . IJMC, 15 (4): 414-436 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparative Study on Snow Cover Monitoring of Different Spatial Resolution Remote Sensing Images., , , , , and . IGARSS (2), page 567-570. IEEE, (2009)The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress., , , and . Comput. Hum. Behav., (2014)LRS_PKI: A novel blockchain-based PKI framework using linkable ring signatures., , and . Comput. Networks, (December 2023)Secure Two-party Computation Approach for NTRUEncrypt., , , and . IACR Cryptol. ePrint Arch., (2022)A Multi-server Authentication Scheme Based on Fuzzy Extractor., , and . ICA3PP (1), volume 14487 of Lecture Notes in Computer Science, page 488-500. Springer, (2023)A Novel Fingerprint-Based Biometric Encryption., , and . 3PGCIC, page 146-150. IEEE Computer Society, (2014)Pareto-Optimized Thermal Control of Multi-Zone Buildings Using Limited Sensor Measurements., , , , , and . IEEE Trans. Smart Grid, 15 (5): 4674-4689 (September 2024)The number of the isomorphism classes of hyperelliptic curves of genus four over finite fields., and . IAS, page 161-166. IEEE, (2010)A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge., , , and . IJDSN, (2015)A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture., , , , and . Secur. Commun. Networks, (2021)