Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling adsorption-desorption processes in porous media., and . Computing in Science and Engineering, 1 (1): 84-91 (1999)An new approach to multi-layer network survivability: strategies, model and algorithm., , , , and . J. High Speed Networks, 10 (2): 127-134 (2001)Hierarchical location service for wireless sensor networks with mobile sinks., , , and . Wireless Communications and Mobile Computing, 10 (7): 899-911 (2010)A Secure and Efficient Remote User Authentication Scheme for Multi-server Environments Using ECC., , , and . TIIS, 8 (8): 2930-2947 (2014)Solutions of linear ordinary differential equations with non-singular varying coefficients by using the corrected Fourier series., , , and . Applied Mathematics and Computation, 187 (2): 765-776 (2007)Quantum Fisher information for superpositions of spin states., , , and . Quantum Information & Computation, 10 (5&6): 498-508 (2010)Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards., , , , and . J. Network and Computer Applications, 34 (1): 73-79 (2011)MEMOSEN: Multi-radio Enabled MObile Wireless SEnsor Network., and . AINA (2), page 291-295. IEEE Computer Society, (2006)Deploying Multiple Mobile Sinks in Event-Driven WSNs., , , , and . ICC, page 2293-2297. IEEE, (2008)Shift Coding: Efficient State Update in Mobile Peer-to-Peer Multiplayer Games., , , , , , and . ICPP Workshops, page 58. IEEE Computer Society, (2007)