Author of the publication

Efficient Key Distribution Protocol for Secure Multicast Communication.

, , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 1007-1016. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study of Spam and Spam Vulnerable email Accounts., , and . FGCN (1), page 408-413. IEEE Computer Society, (2007)A case-based reasoning approach for building a decision model., and . Expert Systems, 19 (3): 123-135 (2002)A methodology for modeling influence diagrams: a case-based reasoning approach., , and . Int. Syst. in Accounting, Finance and Management, 9 (1): 55-63 (2000)Design of Automatic Identification Gateway System for Different IoT Devices and Services., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 2022-2025. IEEE, (2018)Development of automated 3D knee bone segmentation with inhomogeneity correction for deformable approach in magnetic resonance imaging., , , , and . RACS, page 285-290. ACM, (2018)Study on Medical Emergency Alert Algorithm Based on Acceleration Algorithm., , , , , and . ICISA, page 1-4. IEEE, (2013)Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks., , , , and . WISA, volume 4298 of Lecture Notes in Computer Science, page 282-296. Springer, (2006)The Analysis and Countermeasures on Security Breach of Bitcoin., , , , , and . ICCSA (4), volume 8582 of Lecture Notes in Computer Science, page 720-732. Springer, (2014)Adaptive CBT/Anycast Routing Algorithm for Multimedia Traffic Overload., , and . ICCSA (4), volume 3046 of Lecture Notes in Computer Science, page 451-459. Springer, (2004)Efficient Key Distribution Protocol for Secure Multicast Communication., , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 1007-1016. Springer, (2004)