Author of the publication

Guest access: change even your mother into an effective security technician.

, , , and . CCNC, page 442-447. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hot-cold data filtering and management for PRAM based memory-storage unified system., , , , and . SMC, page 1609-1614. IEEE, (2017)Automatic Estimation of Fetal Abdominal Circumference From Ultrasound Images., , , , , and . IEEE J. Biomed. Health Informatics, 22 (5): 1512-1520 (2018)A Two-Stage Approach for Beam Hardening Artifact Reduction in Low-Dose Dental CBCT., , , , and . IEEE Access, (2020)Secure Electronic Copyright Distribution with Public Key Based Traitor Tracing., , and . EC-Web, volume 2455 of Lecture Notes in Computer Science, page 324-332. Springer, (2002)JBNU-CCLab at SemEval-2022 Task 12: Machine Reading Comprehension and Span Pair Classification for Linking Mathematical Symbols to Their Descriptions., and . SemEval@NAACL, page 1679-1686. Association for Computational Linguistics, (2022)A Secure Electronic Software Distribution (ESD) Protocol Based on PKC., , and . EC-Web, volume 1875 of Lecture Notes in Computer Science, page 63-71. Springer, (2000)Two-Pass Hybrid Key Distribution Protocol Based on ECC., and . J. Inf. Sci. Eng., 18 (1): 125-139 (2002)Deep learning for undersampled MRI reconstruction., , , , and . CoRR, (2017)An Embedded SoC System IP to Trace Object and Distance., , , and . ICIC (1), volume 5226 of Lecture Notes in Computer Science, page 1214-1221. Springer, (2008)A News on Demand Service System based on Robot Agent., and . ICPADS, page 528-532. IEEE Computer Society, (1998)