Select Publications
Journal articles
2011, 'A pitfall in fingerprint bio-cryptographic key generation', Computers and Security, 30, pp. 311 - 319, http://dx.doi.org/10.1016/j.cose.2011.02.003
,2011, 'An embedded DSP hardware encryption module for secure E-commerce transactions', Journal of Security and Communication Networks, 4, pp. 902 - 909
,2011, 'Biometric security for mobile computing: Guest Editorial Statements', Journal of Security and Communication Networks, 4, pp. 483 - 486
,2011, 'Correlation keystroke verification scheme for user access control in cloud computing environment', Computer Journal, 54, pp. 1632 - 1644, http://dx.doi.org/10.1093/comjnl/bxr064
,2011, 'Global Ridge Orientation Modeling for Partial Fingerprint Identification', IEEE Transactions on Pattern Analysis and Machine Intelligence, 33, pp. 72 - 87, http://dx.doi.org/10.1109/TPAMI.2010.73
,2011, 'Pair-polar coordinate-based cancelable fingerprint templates', Pattern Recognition, 44, pp. 2555 - 2564, http://dx.doi.org/10.1016/j.patcog.2011.03.015
,2011, 'Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy', Journal of Network and Computer Applications, 34, pp. 1150 - 1159, http://dx.doi.org/10.1016/j.jnca.2010.11.013
,2011, 'Self-healing Key Distribution Schemes for Wireless Networks: A Survey', Computer Journal, 54, pp. 549 - 569, http://dx.doi.org/10.1093/comjnl/bxr022
,2011, 'The exploration of network coding in IEEE 802.15.4 networks', International Journal of Digital Multimedia Broadcasting, 2011, pp. Art. No. 310647, http://dx.doi.org/10.1155/2011/310647
,2010, 'An efficient self-healing key distribution scheme with constant-size personal keys for wireless sensor networks', IEEE International Conference on Communications, http://dx.doi.org/10.1109/ICC.2010.5501988
,2007, 'A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing', IEEE Transactions on Pattern Analysis and Machine Intelligence, 29, pp. 573 - 585, http://dx.doi.org/10.1109/TPAMI.2007.1003
,2005, 'Simulation study of TCP performance under mobile IPv4 within integrated wired and wireless networks', 2004 IEEE Workshop on IP Operations and Management Proceedings, IPOM 2004: Self-Measurement and Self-Management of IP Networks and Services, pp. 273 - 277
,2004, 'An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls', Proceedings - IEEE International Conference on Networks, ICON, 2, pp. 470 - 474, http://dx.doi.org/10.1109/ICON.2004.1409210
,2004, 'Analytic models for highspeed TCP fairness analysis', Proceedings - IEEE International Conference on Networks, ICON, 2, pp. 725 - 730, http://dx.doi.org/10.1109/ICON.2004.1409271
,2003, 'A multi-layer model for anomaly intrusion detection using program sequences of system calls', IEEE International Conference on Networks, ICON, pp. 531 - 536, http://dx.doi.org/10.1109/icon.2003.1266245
,2003, 'A note on an analytic model for slow start in TCP', IEEE International Conference on Networks, ICON, pp. 261 - 264, http://dx.doi.org/10.1109/icon.2003.1266200
,2002, 'New encryption model for secure e-commerce transactions using DSP host, board and server communication issues', Proceeding of the International Conference on Telecommunications, 1, pp. 166 - 170
,2001, 'DSP application in E-Commerce security', ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 2, pp. 1005 - 1008
,2000, 'Systematic H
1999, 'New insights for the filtered-X algorithm and robust adaptive equalization', Conference Record of the 33rd Asilomar Conference on Signals, Systems, and Computers, 1, pp. 544 - 546, http://dx.doi.org/10.1109/ACSSC.1999.832389
,1998, 'Comments on "design of decentralized control for symmetrically interconnected systems"', Automatica, 34, pp. 925 - 927
,