Author of the publication

Lightweight security for mobile commerce transactions.

, , , and . Computer Communications, 26 (18): 2052-2060 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A robust certification service for highly dynamic MANET in emergency tasks., , , , , and . Int. J. Communication Systems, 22 (9): 1177-1197 (2009)Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems., , , , and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 414-426. Springer, (2004)Real-Time Emulation of Intrusion Victim in HoneyFarm., , , , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 143-154. Springer, (2004)Anomaly Detection in Grid Computing Based on Vector Quantization., , , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 883-886. Springer, (2004)Multivariate data analysis software for enhancing system security., , and . Journal of Systems and Software, 31 (3): 267-275 (1995)Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services., , , , and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 63-75. Springer, (2003)Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network., , , and . EUC (2), page 312-317. IEEE Computer Society, (2008)978-0-7695-3492-3.Efficient Fingercode Classification., , , , , and . IEICE Transactions, 91-D (5): 1252-1260 (2008)Efficient vector quantization using genetic algorithm., , , , , and . Neural Computing and Applications, 14 (3): 203-211 (2005)An Economic Model to Estimate Software Rewriting and Replacement Times., , and . IEEE Trans. Software Eng., 22 (8): 580-598 (1996)