Author of the publication

More Results on Experimental Evaluations of Some Algorithms for Block Sorting.

, , and . BIBE, page 105-110. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling Context-Adaptive Energy-Aware Security in Mobile Devices., , , and . LCN Workshops, page 105-109. IEEE, (2018)On Approximability of Block Sorting, and . CoRR, (2011)On vulnerability analysis of several password authentication protocols., , and . Innov. Syst. Softw. Eng., 11 (3): 167-176 (2015)More Results on Experimental Evaluations of Some Algorithms for Block Sorting., , and . BIBE, page 105-110. IEEE, (2020)Towards designing and implementing a secure one time password (OTP) authentication system., , and . IPCCC, page 1-2. IEEE Computer Society, (2016)Context-sec: Balancing Energy Consumption and Security of Mobile Devices., , , , and . IGSC, page 1-6. IEEE, (2018)Multi-Robot Information Gathering for Precision Agriculture: Current State, Scope, and Challenges., , , and . IEEE Access, (2021)STRIP EXCHANGING IS HARD.. Electron. Colloquium Comput. Complex., (2009)Toward a Green Blockchain: Engineering Merkle Tree and Proof of Work for Energy Optimization., , , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 3847-3857 (December 2022)Content Delivery Networks: State of the Art, Trends, and Future Roadmap., , , , , , , , , and . ACM Comput. Surv., 53 (2): 34:1-34:34 (2021)