Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Whole exome sequencing analysis pipeline for the discovery of mutations causative of human rare diseases., , , , , , , , , and 1 other author(s). IWBBIO, page 253-254. Copicentro Editorial, (2013)Modeling and Simulation of Upper Brachial Plexus Injury., , , , , and . IEEE Systems Journal, 10 (3): 912-921 (2016)Characterizing Normal and Pathological Gait through Permutation Entropy., , , , , , and . Entropy, 20 (1): 77 (2018)Security services architecture for Secure Mobile Grid Systems., , and . Journal of Systems Architecture - Embedded Systems Design, 57 (3): 240-258 (2011)Trust management systems for wireless sensor networks: Best practices., , , and . Computer Communications, 33 (9): 1086-1093 (2010)Optimized multi-party certified email protocols., , and . Inf. Manag. Comput. Security, 13 (5): 350-366 (2005)Agent-mediated non-repudiation protocols., , , and . Electronic Commerce Research and Applications, 3 (2): 152-162 (2004)Probabilistic receiver-location privacy protection in wireless sensor networks., , and . Inf. Sci., (2015)A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes., , and . MONET, 12 (4): 231-244 (2007)A secure solution for commercial digital libraries., , , , and . Online Information Review, 27 (3): 147-159 (2003)