Author of the publication

Multivariate data analysis software for enhancing system security.

, , and . Journal of Systems and Software, 31 (3): 267-275 (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust Based Routing for Misbehavior Detection in Ad Hoc Networks., , , , , and . JNW, 5 (5): 551-558 (2010)Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions., , and . J. Cryptology, 14 (2): 137-150 (2001)Towards Energy-Efficient Secure Communications Using Biometric Key Distribution in Wireless Biomedical Healthcare Networks., , , , and . BMEI, page 1-5. IEEE, (2009)Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture., , and . IPDPS, IEEE Computer Society, (2002)Improving Spectrum Management for Satellite Communication Systems With Hunger Marketing., , , , , and . IEEE Wireless Commun. Letters, 8 (3): 797-800 (2019)Robust Remote Authentication for Scalable Web-Based Services., , , and . IIH-MSP, page 1113-1117. IEEE Computer Society, (2008)Several classes of binary sequences with three-level autocorrelation., , and . IEEE Trans. Information Theory, 45 (7): 2606-2612 (1999)Undeniable Billing in Mobile Communication., and . MobiCom, page 284-290. ACM, (1998)Ubiquitous and Secure Certificate Service for Wireless Ad Hoc Network., , , and . IEICE Transactions, 93-D (7): 1848-1856 (2010)Using Blockchain to Control Access to Cloud Data., , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 274-288. Springer, (2018)