Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NBC: An Efficient Hierarchical Clustering Algorithm for Large Datasets., , , , and . Int. J. Semantic Computing, 9 (3): 307-332 (2015)Dynamic E-commerce Security Based on the Web Services., and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 1030-1033. Springer, (2003)A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks., , , and . TIIS, 8 (9): 3250-3265 (2014)ApproxCCA: An approximate correlation analysis algorithm for multidimensional data streams., , and . Knowl.-Based Syst., 24 (7): 952-962 (2011)A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks., , , and . IJDSN, 12 (4): 3815834:1-3815834:13 (2016)SeShare: Secure cloud data sharing based on blockchain and public auditing., , , , and . Concurrency and Computation: Practice and Experience, (2019)A Review of Cost and Makespan-Aware Workflow Scheduling in Clouds., , , , , and . Journal of Circuits, Systems, and Computers, 28 (6): 1930006:1-1930006:28 (2019)A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes., , , and . IJISP, 11 (1): 52-64 (2017)Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group., , and . ACSW, page 76:1-76:6. ACM, (2017)Permission Assurance for Semantic Aspects of Design Patterns., , , and . APSEC, page 559-564. IEEE, (2012)