Author of the publication

IPTV and Secure Digital Contents Downloading.

, and . NBiS, page 582-585. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Efficiency Analyses of Security Mechanisms in e-Passport Systems., , , , and . Security and Management, page 547-553. CSREA Press, (2009)Generating knowledge for the identification of device failure causes and the prediction of the times-to-failure in u-Healthcare environments., , , and . Personal and Ubiquitous Computing, 17 (7): 1383-1394 (2013)A hybrid user authentication protocol for mobile IPTV service., , and . Multimedia Tools Appl., 65 (2): 283-296 (2013)Advances in wireless sensor communications and applications for smart space., , , and . Telecommun. Syst., 52 (4): 2321-2323 (2013)Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments., , , , and . IET Commun., 3 (5): 764-771 (2009)Multi-frame Beacon Management for constructing interference-avoided LR-WPAN., , and . Int. J. Ad Hoc Ubiquitous Comput., 5 (3): 178-188 (2010)A robust and secure time-domain ICI canceller for OFDM based ubiquitous systems in time-varying multipath channels., , , , , and . J. Supercomput., 45 (1): 29-43 (2008)Authentication Method for Privacy Protection in Smart Grid Environment., , and . J. Appl. Math., (2014)Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard., , , , and . ISPA Workshops, volume 4743 of Lecture Notes in Computer Science, page 245-254. Springer, (2007)Security Considerations in Cloud Computing Virtualization Environment., and . GPC, volume 7861 of Lecture Notes in Computer Science, page 208-215. Springer, (2013)