Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

P3: Privacy preservation protocol for appliance control application., , , and . SmartGridComm, page 294-299. IEEE, (2012)Interoperable internet scale security framework for RFID networks., , and . ICDE Workshops, page 94-99. IEEE Computer Society, (2008)Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis., , , and . ISGT, page 1-8. IEEE, (2012)Towards Cloud-Based Decision Support Platform for Group Decision Making., , , and . SMC, page 50-55. IEEE, (2013)InkBoard - Tablet PC Enabled Designoriented Learning., , , and . CATE, page 154-160. ACTA Press, (2004)G-NAS: A grid-based approach for negative authentication., , , , , , , and . CICS, page 9-18. IEEE, (2014)A malicious activity detection system utilizing predictive modeling in complex environments., , , , , , , and . CCNC, page 371-379. IEEE, (2014)An Interoperable Internet Scale Solution for RFID Network Security., , and . ICCCN, page 1-6. IEEE Computer Society, (2009)A Web-Based Decision Support Platform for Multidimensional Modeling of Complex Engineering Systems., , , , and . EWG-DSS, volume 184 of Lecture Notes in Business Information Processing, page 45-56. Springer, (2013)Deploy, Connect and Execute Scientific Models., , , , , and . CISIS, volume 1194 of Advances in Intelligent Systems and Computing, page 83-96. Springer, (2020)