Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Enhancement on Li-Lee's Remote User Authentication Scheme Using Smart Card., , and . Computación y Sistemas, (2014)CT4RDD: Classification trees for research on digital divide., , , , , , and . Expert Syst. Appl., 40 (14): 5779-5786 (2013)A regression model based on the nearest centroid neighborhood., , , and . Pattern Anal. Appl., 21 (4): 941-951 (2018)A Novel Framework for Generating Personalized Network Datasets for NIDS Based on Traffic Aggregation., , , , , , , and . Sensors, 22 (5): 1847 (2022)Classification of network anomalies in flow level network traffic using Bayesian networks., , , , , and . CONIELECOMP, page 238-243. IEEE, (2018)Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols., , , and . ARES, page 701-708. IEEE Computer Society, (2008)Fast Parabolic Fitting: An R-Peak Detection Algorithm for Wearable ECG Devices., , , , , and . Sensors, 23 (21): 8796 (October 2023)Mobile Payment Protocol for Micropayments: Withdrawal and Payment Anonymous., , and . NTMS, page 1-5. IEEE, (2008)Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms., , , and . ARES, page 1000-1007. IEEE Computer Society, (2008)Application of Electronic Currency on the Online Payment System like PayPal., and . I3E, volume 226 of IFIP, page 44-56. Springer, (2006)