Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bradford: Building a new cremona?. Int J. Information Management, 25 (5): 473-477 (2005)Analysis of KMM¯ Sequences as Spreading Codes for A-CDMA Systems., and . Wireless Personal Communications, 16 (3): 193-201 (2001)The distribution of peak factor in QPSK Multi-Carrier modulation., , and . Wireless Personal Communications, 2 (1-2): 87-96 (1995)A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast., , and . IEEE Trans. Mob. Comput., 14 (8): 1545-1559 (2015)Distortion analysis of the bulk FFT structure for multi-carrier demodulators., , and . Signal Processing, 42 (2): 215-219 (1995)Optimal sequences for channel estimation using discrete Fourier transform techniques., , , , and . IEEE Trans. Communications, 47 (2): 230-238 (1999)Efficient authenticated multi-service group key management for secure wireless mobile multicast., , , and . FGCT, page 66-71. IEEE, (2014)Modeling and Evaluation of security induced delays in Wireless ATM Networks., and . Operating Systems Review, 33 (3): 26-31 (1999)Clustering Gene Expression Data for Periodic Genes Based on INMF., and . ICIC (3), volume 4115 of Lecture Notes in Computer Science, page 412-423. Springer, (2006)Stream or Block Cipher for Securing VoIP?, and . I. J. Network Security, 5 (2): 128-133 (2007)