Author of the publication

Self-Proxy Mobile Signature: A New Client-Based Mobile Signature Model.

, , and . AINA Workshops, page 437-442. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AMVPayword: Secure and Efficient Anonymous Payword-Based Micropayment Scheme., , and . CIS, page 551-555. IEEE Computer Society, (2010)Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model., and . FGIT, volume 6485 of Lecture Notes in Computer Science, page 439-449. Springer, (2010)Cost-sensitive payment card fraud detection based on dynamic random forest and k-nearest neighbors., and . Expert Syst. Appl., (2018)Agent-oriented Design for Network Survivability., and . ISDA, page 166-171. IEEE Computer Society, (2005)An Enhanced Infrastructure for Peer-to-Peer Intrusion Detection Systems., and . ICECS, page 364-368. IEEE Computer Society, (2009)Trust Evaluation using an Improved Context Similarity Measurement., , and . CoRR, (2014)Intelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment., , , and . IEEE Conf. on Intelligent Systems, page 709-714. IEEE, (2016)Using Genre Interest of Users to Detect Profile Injection Attacks in Movie Recommender Systems., , , and . ICMLA (1), page 49-52. IEEE Computer Society, (2011)Flash payment: payment using flash disks., and . ICEC, page 346-351. ACM, (2009)Path reduction in complex grid service provision., and . ICEC, page 88-93. ACM, (2010)