Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

InkBoard - Tablet PC Enabled Designoriented Learning., , , and . CATE, page 154-160. ACTA Press, (2004)An Interoperable Internet Scale Solution for RFID Network Security., , and . ICCCN, page 1-6. IEEE Computer Society, (2009)G-NAS: A grid-based approach for negative authentication., , , , , , , and . CICS, page 9-18. IEEE, (2014)A malicious activity detection system utilizing predictive modeling in complex environments., , , , , , , and . CCNC, page 371-379. IEEE, (2014)A multi-core numerical framework for characterizing flow in oil reservoirs., , , and . SpringSim (HPC), page 166-174. SCS/ACM, (2011)Clustering Household Electricity Use Profiles.. MLSDA@AUS-AI, page 19. ACM, (2013)System Recovery Concepts in a Distributed Processing System., , , and . ICC (2), page 558-561. Elsevier, (1984)P3: Privacy preservation protocol for appliance control application., , , and . SmartGridComm, page 294-299. IEEE, (2012)Interoperable internet scale security framework for RFID networks., , and . ICDE Workshops, page 94-99. IEEE Computer Society, (2008)Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis., , , and . ISGT, page 1-8. IEEE, (2012)