Author of the publication

A New Class of Single Cycle T-Functions.

, , , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 68-82. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-mining based SQL injection attack detection using internal query trees., and . Expert Syst. Appl., 41 (11): 5416-5430 (2014)Fraud and financial crime detection model using malware forensics., , , and . Multimedia Tools Appl., 68 (2): 479-496 (2014)Constructing PEKS schemes secure against keyword guessing attacks is possible?, , , and . Computer Communications, 32 (2): 394-396 (2009)On a security model of conjunctive keyword search over encrypted relational database., and . Journal of Systems and Software, 84 (8): 1364-1372 (2011)Client cloud Web service: reducing traffic consumption., , , and . Security and Communication Networks, 9 (3): 248-261 (2016)Privacy-preserving disjunctive normal form operations on distributed sets., , , and . Inf. Sci., (2013)A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method., , and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 93-99. Springer, (2012)User Age Profile Assessment Using SMS Network Neighbors' Age Profiles., , , and . AINA Workshops, page 960-965. IEEE Computer Society, (2009)Delaunay Triangles Model for Image-Based Motion Retargeting., and . DEFORM/AVATARS, volume 196 of IFIP Conference Proceedings, page 158-168. Kluwer, (2000)GA based Adaptive Sampling for Image-based Walkthrough., , and . EGVE, page 135-142. Eurographics Association, (2006)