Author of the publication

A Scheme for Controlling Functionality of Mobile Device Using Specialized Codes.

, and . DASC/PiCom/DataCom/CyberSciTech, page 75-82. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SecureDom: secure mobile-sensitive information protection with domain separation., , and . J. Supercomput., 72 (7): 2682-2702 (2016)Efficient DRM mechanism of scalable contents based on H.264/SVC in convergence environment., , and . Multimedia Tools Appl., 73 (2): 841-855 (2014)Efficient Selective Encryption Scheme for the H.264/Scalable Video Coding(SVC)., and . NCM (1), page 371-376. IEEE Computer Society, (2008)Smart Network Services Using Ticket Issuance in the TSM (Trusted Software Monitor) System., and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 279-287. Springer, (2014)Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence., , , and . J. Supercomput., 69 (3): 1215-1234 (2014)Authentication and Copyright Protection Scheme for H.264/AVC and SVC., and . J. Inf. Sci. Eng., 27 (1): 129-142 (2011)An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding., and . IEICE Trans. Inf. Syst., 92-D (5): 851-858 (2009)Combined Scheme of Encryption and Watermarking in H.264/Scalable Video Coding (SVC)., and . New Directions in Intelligent Interactive Multimedia, volume 142 of Studies in Computational Intelligence, Springer, (2008)A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization., , and . IJDSN, (2015)Multiple Device Login Attacks and Countermeasures of Mobile VoIP Apps on Android., and . J. Internet Serv. Inf. Secur., 4 (4): 115-126 (2014)