Author of the publication

Security challenges and countermeasures for trusted virtualized computing environments.

, , and . WorldCIS, page 117-122. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Block-Free Distributed Ledger for P2P Energy Trading: Case with IOTA?, , , and . CAiSE, volume 11483 of Lecture Notes in Computer Science, page 111-125. Springer, (2019)Preserving Busan’s Unique Heritage: Exploring Urban Planning and Zoning Mechanisms for a Greener, More Resilient Future. International Journal of Recent Innovations in Academic Research, 7 (10): 27-35 (October 2023)Doki: A Multi-sensation Interaction Device that Communicates Emotions., , , , , and . Intelligent Environments, page 1-4. IEEE, (2022)Wireless dry EEG for drowsiness detection., , , , and . EMBC, page 3298-3301. IEEE, (2011)A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application., , , , and . ICITST, page 516-523. IEEE, (2013)Security challenges and countermeasures for trusted virtualized computing environments., , and . WorldCIS, page 117-122. IEEE, (2012)A Study on the Relative Importance of Underlying Competencies of Business Analysts., and . KSII Trans. Internet Inf. Syst., 10 (8): 3986-4007 (2016)Prevention of ATM Fraud Using F-PIN., , and . Security and Management, page 173-178. CSREA Press, (2009)Accelerating Random Network Coding using 512-bit SIMD Instructions., , and . ICTC, page 1099-1103. IEEE, (2019)UAV Flight and Landing Guidance System for Emergency Situations †., , , , , and . Sensors, 19 (20): 4468 (2019)