Author of the publication

A Study on the Secure Home Healthcare Wireless Service.

, , and . FGIT, volume 7105 of Lecture Notes in Computer Science, page 277-284. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity., , , , and . Secur. Commun. Networks, (2018)Hybrid Key Management Architecture for Robust SCADA Systems., , , and . J. Inf. Sci. Eng., 29 (2): 281-298 (2013)Efficient Key Distribution Protocol for Electronic Commerce in Mobile Communications., , and . PARA, volume 3732 of Lecture Notes in Computer Science, page 1009-1016. Springer, (2004)Software Birthmark Method Using Combined Structure-Based and API-Based., , , and . J. Softw., 12 (2): 138-144 (2017)On the Security of Girault Key Agreement Protocols against Active Attacks., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (5): 1181-1189 (2003)Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment., , , and . KSII Trans. Internet Inf. Syst., 6 (2): 751-765 (2012)Performance and security enhanced authentication and key agreement protocol for SAE/LTE network., , , , and . Comput. Networks, (2016)Towards trustworthy e-voting using paper receipts., , , , and . Comput. Stand. Interfaces, 32 (5-6): 305-311 (2010)Improvement and Weakness of Zero-Sum Defender against Return-Oriented Programming Attacks., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (12): 2585-2590 (2016)Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (7): 2084-2087 (2006)