|
Search the dblp DataBase
Hassan Jameel:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee
Human Identification Through Image Evaluation Using Secret Predicates. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:67-84 [Conf]
- Hassan Jameel, Umar Kalim, Ali Sajjad, Sungyoung Lee, Taewoong Jeon
Mobile-to-Grid Middleware: Bridging the Gap Between Mobile and Grid Environments. [Citation Graph (0, 0)][DBLP] EGC, 2005, pp:932-941 [Conf]
- Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo Lee, Sungyoung Lee
A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid Infrastructure. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:1225-1234 [Conf]
- Ali Sajjad, Hassan Jameel, Umar Kalim, Sangman Han, Young-Koo Lee, Sungyoung Lee
AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure. [Citation Graph (0, 0)][DBLP] ICAS/ICNS, 2005, pp:73- [Conf]
- Umar Kalim, Hassan Jameel, Ali Sajjad, Sungyoung Lee
Mobile-to-Grid Middleware: An Approach for Breaching the Divide Between Mobile and Grid Environments. [Citation Graph (0, 0)][DBLP] ICN (1), 2005, pp:1-8 [Conf]
- Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei Yuan, Young-Koo Lee, Sungyoung Lee
A Trust Model for Uncertain Interactions in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:755-757 [Conf]
- Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajjad, Sungyoung Lee, Young-Koo Lee
A Trust Model for Ubiquitous Systems based on Vectors of Trust Values. [Citation Graph (0, 0)][DBLP] ISM, 2005, pp:674-679 [Conf]
- Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo Lee, Sungyoung Lee
MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing. [Citation Graph (0, 0)][DBLP] NODe/GSEM, 2005, pp:311-322 [Conf]
- Riaz Ahmed Shaikh, Hassan Jameel, Sungyoung Lee, Saeed Rajput, Young Jae Song
Trust Management Problem in Distributed Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] RTCSA, 2006, pp:411-414 [Conf]
- Faraz Idris Khan, Hassan Jameel, S. M. K. Raazi, Adil Mehmood Khan, Eui-nam Huh
An Efficient Re-keying Scheme for Cluster Based Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2007, pp:1028-1037 [Conf]
- Hassan Jameel, Heejo Lee, Sungyoung Lee
Using Image Attributes for Human Identification Protocols [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
Embedded Processor Security. [Citation Graph (, )][DBLP]
Image-Feature Based Human Identification Protocols on Limited Display Devices. [Citation Graph (, )][DBLP]
Network Level Privacy for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks [Citation Graph (, )][DBLP]
Search in 0.015secs, Finished in 0.017secs
|