Author of the publication

Secure web services using two-way authentication and three-party key establishment for service delivery.

, , , and . J. Syst. Archit., 55 (4): 233-242 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure E-Transactions Protocol using Intelligent Mobile Agents with Fair Privacy., , and . E-Service Intelligence, volume 37 of Studies in Computational Intelligence, Springer, (2007)A proactive event-driven approach for dynamic QoS compliance in cloud of things., , , and . WI, page 971-975. ACM, (2017)A Survey of RFID Authentication Protocols Based on Hash-Chain Method, , , and . CoRR, (2010)Optimized Configuration of Exponential Smoothing and Extreme Learning Machine for Traffic Flow Forecasting., , , and . IEEE Trans. Ind. Informatics, 15 (1): 23-34 (2019)Decision-making framework for user-based inter-cloud service migration., , , and . Electron. Commer. Res. Appl., 14 (6): 523-531 (2015)A service concept recommendation system for enhancing the dependability of semantic service matchmakers in the service ecosystem environment., , and . J. Netw. Comput. Appl., 34 (2): 619-631 (2011)Web-of-things framework for cyber-physical systems., , , , and . Concurr. Comput. Pract. Exp., 23 (9): 905-923 (2011)Probabilistic assessment of financial risk in e-business associations., , , and . Simul. Model. Pract. Theory, 19 (2): 704-717 (2011)A Service Search Engine for the Industrial Digital Ecosystems., , and . IEEE Trans. Ind. Electron., 58 (6): 2183-2196 (2011)A Methodology to Find Influential Prosumers in Prosumer Community Groups., , , , and . IEEE Trans. Ind. Informatics, 10 (1): 706-713 (2014)