Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public key cryptography-based security scheme for wireless sensor networks in healthcare., , , and . ICUIMC, page 5. ACM, (2010)Indexation des émotions dans les documents audiovisuels à partir de la modalité auditive. (Indexing emotions in audiovisual documents using the auditory modality).. Hanoi University of Science and Technology, Vietnam, (2009)Performance Evaluation of Quick-Start in Low Latency Networks., , , , and . CCNC, page 1-3. IEEE, (2010)A Trust-Based Security Architecture for Ubiquitous Computing Systems., , , , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 753-754. Springer, (2006)An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks., , , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 735-736. Springer, (2006)Secured WSN-integrated cloud computing for u-Life Care., , , , , , , , , and 2 other author(s). CCNC, page 1-2. IEEE, (2010)Embedded Processor Security., , , , , , , , , and 6 other author(s). Security and Management, page 591-. CSREA Press, (2007)Assessing the Usage of a Guideline-Driven Interactive Case Simulation Tool for Insomnia Screening and Treatment in an HIV Clinical Education Program., , and . MedInfo, volume 192 of Studies in Health Technology and Informatics, page 323-327. IOS Press, (2013)Correlations between Promotional Activities and Usage of a Guideline-Driven Interactive Case Simulation Tool., , and . AMIA, AMIA, (2013)A Trust Model with Dynamic Decision Making for Ubiquitous Environments., , , , and . ICON, page 1-6. IEEE, (2006)