Author of the publication

C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol.

, , , and . J. Information Security, 3 (4): 272-280 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An automatic intelligent system for diagnosis and confirmation of Johne's disease., , and . IJISTA, 14 (2): 128-144 (2015)Automatic Recognition of Arabic Sign Language Finger Spelling., and . I. J. Comput. Appl., (2001)Modeling nonlinear behavior of Buckling-Restrained Braces via different artificial intelligence methods., , and . Appl. Soft Comput., (2015)Energy consumption considerations in dynamic wireless sensor networks with nodes and base stations mobility., , and . IJSNet, 7 (4): 217-227 (2010)Remote patient monitoring and information system., , and . IJEH, 2 (3): 231-249 (2006)Implementation of experimental communication protocol for health monitoring of patients., , and . Computer Standards & Interfaces, 28 (5): 523-530 (2006)Recognition of dynamic gestures in arabic sign language using two stages hierarchical scheme., , and . KES Journal, 14 (3): 139-152 (2010)AMCC: Ad-hoc based Mobile Cloud Computing Modeling., , and . FNC/MobiSPC, volume 56 of Procedia Computer Science, page 580-585. Elsevier, (2015)Joint Geographic and Energy-aware Routing Protocol for Static and Mobile Wireless Sensor Networks., , , , , and . Ad Hoc & Sensor Wireless Networks, 41 (3-4): 165-190 (2018)Data Delivery in Mobile Ad Hoc Networks Using Artificial Intelligent., and . ICWN, page 401-407. CSREA Press, (2009)