Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing., , and . Concurr. Comput. Pract. Exp., (2020)Functional failure modes cause-consequence logic suited for mobile robots used at scientific facilities., , , and . Reliab. Eng. Syst. Saf., (2014)Generalized hybrid approach to adjoint code derivation for efficient uncertainty and reliability studies., , and . Int. J. Syst. Assur. Eng. Manag., 6 (2): 172-182 (2015)Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud., , and . Trans. Emerg. Telecommun. Technol., (2018)Secure Multipath Routing Scheme using Key Pre-Distribution in Wireless Sensor Networks., , and . CoRR, (2014)Agent Enriched Distributed Association Rules Mining: A Review., , and . ADMI, volume 7103 of Lecture Notes in Computer Science, page 30-45. Springer, (2011)Design of Bessel Low Pass filter using DGs with Improved Characteristics for RF/microwave Applications., , and . Journal of Circuits, Systems, and Computers, (2014)Cryptanalysis and improvement of certificateless proxy signcryption scheme for e-prescription system in mobile cloud computing., and . Ann. des Télécommunications, 72 (9-10): 563-576 (2017)An alternative fixed grid method for solution of the classical one-phase Stefan problem., , and . Appl. Math. Comput., 158 (2): 573-584 (2004)The underlying technologies in WSNs: ZigBee vs. wireless HART., and . FSKD, page 2208-2213. IEEE, (2015)