Author of the publication

Optical Fiber Sensor Network Integrating Communication and Sensing Functions Using Hetero-core Spliced Fiber Optic Sensors.

, , and . AINA, page 749-757. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones., and . WISA, volume 4298 of Lecture Notes in Computer Science, page 225-236. Springer, (2006)A Personal Information Protection Model for Web Applications by Utilizing Mobile Phones., , , and . EJC, volume 166 of Frontiers in Artificial Intelligence and Applications, page 346-353. IOS Press, (2007)A Security Measure Selection Scheme with Consideration of Potential Lawsuits., , , , , and . Security and Management, page 104-110. CSREA Press, (2010)LAN fault management ensemble., , , and . NOMS, page 540-551. IEEE, (1996)A threat model for security specification in security evaluation by ISO/IEC 19791., and . APNOMS, page 1-8. IEEE, (2012)Enhancement of a Company-Wide Information Security Management System Through Incident Learning., , , , , , , and . SN Comput. Sci., 4 (3): 211 (May 2023)A method for calculating system similarity for the evaluation of practical accomplishments in person-in-charge allocation support., , and . SoMeT, volume 231 of Frontiers in Artificial Intelligence and Applications, page 127-140. IOS Press, (2011)A Threat Model for Security Specification in Security Evaluation by ISO/IEC 19791., and . J. Inf. Process., 21 (4): 624-631 (2013)Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks., , , , , , , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 77-88. Springer, (2016)Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation., , and . CyberSec, page 46-51. IEEE Computer Society, (2015)