Author of the publication

A Location Privacy Protection Mechanism for Smart Space.

, , , , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 162-173. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study on the Quantitative Design and Documentation for the VR Based Training Contents Realism., , and . MUE/FutureTech, volume 448 of Lecture Notes in Electrical Engineering, page 573-579. (2017)Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism., , , , and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 915-924. Springer, (2004)XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing., , , , and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 251-259. Springer, (2006)Security Frameworks for Open LBS Based on Web Services Security Mechanism., , , , and . ISPA Workshops, volume 3759 of Lecture Notes in Computer Science, page 609-618. Springer, (2005)Forensics for Korean cell phone., , and . e-Forensics, page 30. ICST/ACM, (2008)A Location Privacy Protection Mechanism for Smart Space., , , , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 162-173. Springer, (2003)A DPA Countermeasure by Randomized Frobenius Decomposition., , , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 271-282. Springer, (2005)A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services., , , , and . ICWE, volume 3579 of Lecture Notes in Computer Science, page 191-196. Springer, (2005)SPA Countermeasure Based on Unsigned Left-to-Right Recodings., , , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 286-295. Springer, (2007)Design and Implementation of Crypto Co-processor and Its Application to Security Systems., , , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 1104-1109. Springer, (2005)