Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

2D Color Barcodes for Mobile Phones., , , and . Int. J. Comput. Sci. Appl., 8 (1): 136-155 (2011)The Competitor Busting Strategy in Keyword Auctions: Who's Worst Hit?, , , , and . CNSR, page 153-160. IEEE Computer Society, (2011)SAVED: Secure Android Value addED services., , , , and . MobiCASE, volume 76 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 415-427. Springer, (2010)High Capacity Colored Two Dimensional Codes., , , and . IMCSIT, page 709-716. IEEE, (2010)Shared Backup & Restore: Save, Recover and Share Personal Information into Closed Groups of Smartphones., , , , and . NTMS, page 1-5. IEEE, (2011)Transaction Oriented Text Messaging with Trusted-SMS., , , and . ACSAC, page 485-494. IEEE Computer Society, (2008)A Sketch-Based Architecture for Mining Frequent Items and Itemsets from Distributed Data Streams., , , and . CCGRID, page 245-253. IEEE Computer Society, (2011)Fast User Classifying to Establish Forensic Analysis Priorities., , , and . IMF, page 69-77. IEEE Computer Society, (2009)SecureMyDroid: enforcing security in the mobile devices lifecycle., , , and . CSIIRW, page 27. ACM, (2010)A Model for the Dynamics of Bidders in the Simulation of Keyword Auctions., , , , and . UKSim, page 440-445. IEEE Computer Society, (2011)