Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the convergence and representation of random fuzzy number integrals., , and . Fuzzy Sets and Systems, 103 (1): 115-125 (1999)Secret sharing scheme with dynamic size of shares for distributed storage system., , , , , and . Security and Communication Networks, 7 (8): 1245-1252 (2014)Secure chaotic system with application to chaotic ciphers., , , and . Inf. Sci., (2013)An Efficient and Secure Biometric Remote User Authentication Scheme Using Smart Cards., and . PACIIA (2), page 913-917. IEEE Computer Society, (2008)978-0-7695-3490-9.Optimizing security and quality of service in a Real-time database system using Multi-objective genetic algorithm., , , , , and . Expert Syst. Appl., (2016)Towards efficient multimedia publish/subscribe in urban VANETs., , , , , and . SMARTCOMP, page 156-163. IEEE Computer Society, (2014)Latency Estimation-Based Data Delivery Scheme for Vehicular Ad Hoc Networks., , , , and . IJDSN, (2012)Symmetry Reduction and Numerical Solution of Von K a ' rm a ' n Swirling Viscous Flow., and . Symmetry, 10 (4): 120 (2018)Management-Control Integration for Safety-Critical Integration for Safety-Critical Discrete Operation System., , and . ICCAIS, page 434-439. IEEE, (2018)Using Chinese Characters To Generate Text-Based Passwords For Information Security., , , , , , , , , and 5 other author(s). CoRR, (2019)