Author of the publication

Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation).

, , , , and . IMIS, page 709-713. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Next generation mobility management., , , and . Wireless Communications and Mobile Computing, 11 (4): 443-445 (2011)Information Security., and . J. UCS, 19 (16): 2347-2348 (2013)Secure ubiquitous computing., , , and . Pervasive and Mobile Computing, (2015)Recommendation of More Interests Based on Collaborative Filtering., , , , , , and . AINA, page 191-198. IEEE Computer Society, (2012)Understanding urban dynamics based on pervasive sensing: An experimental study on traffic density and air pollution., , , , , and . Mathematical and Computer Modelling, 58 (5-6): 1328-1339 (2013)A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices., , , , , and . IMIS, page 595-600. IEEE Computer Society, (2013)Opportunistic sharing scheme for spectrum allocation in wireless virtualization., , , , , and . Soft Comput., 18 (9): 1685-1696 (2014)An exploration of cache collaboration in information-centric network., , , and . Int. J. Communication Systems, 27 (9): 1243-1267 (2014)Maintaining strong consistency for the identifier-to-locator mapping cache., , , , and . GLOBECOM Workshops, page 986-991. IEEE, (2012)Balanced bipartite graph based register allocation for network processors in mobile and wireless networks., , , , and . Mobile Information Systems, 6 (1): 65-83 (2010)