Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the security defects of an image encryption scheme., , , , , and . Image Vision Comput., 27 (9): 1371-1381 (2009)A Compose Language-Based Framework for Secure Service Composition., , , , , and . CyberSecurity, page 195-202. IEEE Computer Society, (2012)A Key Frame Based Video Summarization using Color Features., , , , and . CVCS, page 1-6. IEEE, (2018)Cloud-SEnergy: A bin-packing based multi-cloud service broker for energy efficient composition and execution of data-intensive applications., , , , , and . SUSCOM, (2018)A Cell Detection Technique for Downlink Channel in Underwater Multicell Networks., and . ICTC, page 1055-1057. IEEE, (2018)Machine learning and the Internet of Things security: Solutions and open challenges., , , , and . J. Parallel Distributed Comput., (2022)Prototype for design-time secure and trustworthy service composition., , , , and . CCNC, page 847-848. IEEE, (2013)A Sensor Relocation Scheme for Wireless Sensor Networks., , , and . AINA Workshops, page 808-813. IEEE Computer Society, (2011)Mitigation of phase noise in single carrier frequency domain equalization systems., , and . WCNC, page 920-924. IEEE, (2012)Dynamic Monitoring of Composed Services., , , , and . Cyberpatterns, Springer, (2014)