Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DObjects: Enabling Distributed Data Services for Metacomputing Platforms., , and . ICCS (1), volume 5101 of Lecture Notes in Computer Science, page 136-145. Springer, (2008)Self-organized Path Constraint Neural Network: Structure and Algorithm., , and . ICONIP (1), volume 4232 of Lecture Notes in Computer Science, page 457-466. Springer, (2006)Fingerprint Orientation Field Estimation: Model of Primary Ridge for Global Structure and Model of Secondary Ridge for Correction., , , and . ACCV (3), volume 5996 of Lecture Notes in Computer Science, page 246-255. Springer, (2009)Authentication Protocol for Distributed Cloud Computing: An Explanation of the Security Situations for Internet-of-Things-Enabled Devices., , , , and . IEEE Consumer Electronics Magazine, 7 (6): 38-44 (2018)A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks., , , , , , , and . Wireless Personal Communications, 93 (2): 383-407 (2017)Oblivious Transfer Protocols Based on Group Factoring Problem., , , , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 885-892. Springer, (2016)PriSTE: From Location Privacy to Spatiotemporal Event Privacy., , , and . ICDE, page 1606-1609. IEEE, (2019)A study for the development of K-sound based automatic blood pressure device using PVDF film., , and . EMBC, page 255-258. IEEE, (2016)Group Nearest Compact POI Set Queries in Road Networks., and . MDM, page 106-111. IEEE, (2019)Privacy Preserving Reverse k-Nearest Neighbor Queries., , , , and . MDM, page 177-186. IEEE Computer Society, (2018)