Author of the publication

An improved side channel attack using event information of subtraction.

, , , and . J. Netw. Comput. Appl., (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study of the method of providing secure network channel among secure OSs., , and . ISICT, volume 49 of ACM International Conference Proceeding Series, page 345-350. Trinity College Dublin, (2003)Secure mobile device structure for trust IoT., , , and . J. Supercomput., 74 (12): 6646-6664 (2018)Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence., , , and . J. Supercomput., 69 (3): 1215-1234 (2014)Adaptive authentication scheme for mobile devices in proxy MIPv6 networks., , , , and . IET Commun., 10 (17): 2319-2327 (2016)SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers., , , and . Mob. Inf. Syst., (2017)Protection method from APP repackaging attack on mobile device with separated domain., , , and . ICTC, page 667-668. IEEE, (2014)Design and Implementation of a Gigabit Router using Network Processor., , , , and . IMSA, page 32-35. IASTED/ACTA Press, (2005)Efficient DRM mechanism of scalable contents based on H.264/SVC in convergence environment., , and . Multimedia Tools Appl., 73 (2): 841-855 (2014)A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks., , , , , and . IEEE Access, (2019)Deterministic Task Scheduling for Embedded Real-Time Operating Systems., , , and . IEICE Trans. Inf. Syst., 87-D (2): 472-474 (2004)