Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of novel PI3Kδ inhibitors by docking, ADMET prediction and molecular dynamics simulations., , , , , and . Computational Biology and Chemistry, (2019)Identification of novel PPARα/γ dual agonists by pharmacophore screening, docking analysis, ADMET prediction and molecular dynamics simulations., , , , , , and . Computational Biology and Chemistry, (2019)Fault Detection of the MacGuffin Cipher against Differential Fault Attack., , , , and . INTRUST, volume 7222 of Lecture Notes in Computer Science, page 102-112. Springer, (2011)A Collaborative Multi-Agent Model with Knowledge-Based Communication for the RoboCupRescue Simulation., , , , , and . CTS, page 341-348. IEEE Computer Society, (2006)Energy efficiency optimization-oriented control plane and user plane adaptation with a frameless network architecture for 5G., , , , and . EURASIP J. Wireless Comm. and Networking, (2015)A new heuristic algorithm for the operating room scheduling problem., , and . Computers & Industrial Engineering, 61 (3): 865-871 (2011)A new production and shipment policy for a coordinated single-vendor single-buyer system with deteriorating items., , and . Computers & Industrial Engineering, (2019)Improved Impossible Differential Attacks on Large-Block Rijndael., , , , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 126-140. Springer, (2012)Linear Cryptanalysis of ARIA Block Cipher., , , , and . ICICS, volume 7043 of Lecture Notes in Computer Science, page 242-254. Springer, (2011)Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things., , , , , , and . TIIS, 9 (2): 793-810 (2015)