Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of remote system using touchless palmprint recognition algorithm., , , , and . MoMM, page 33-41. ACM, (2010)Side-Channel Analysis of the K2 Stream Cipher., , , , and . ACISP, volume 6168 of Lecture Notes in Computer Science, page 53-73. Springer, (2010)HARP: FORTRAN to silicon compilation system., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 8 (6): 649-660 (1989)High-Quality and High-Speed Wireless Multimedia Transmission Technology for Personal Handy Phone System., , , , and . Wireless Personal Communications, 9 (3): 255-270 (1999)A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework., , , and . Security and Management, page 323-329. CSREA Press, (2010)Anonymous Prepaid Content Viewing System with Mobile Terminal., , , , and . SECRYPT, page 281-288. INSTICC Press, (2007)On Effectiveness of Clock Control in Stream Ciphers., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 90-A (9): 1780-1787 (2007)K2 Stream Cipher., , and . ICETE (Selected Papers), volume 23 of Communications in Computer and Information Science, page 214-226. Springer, (2007)A Search-Based Approach to the Railway Rolling Stock Allocation Problem., , and . COCOA (2), volume 6509 of Lecture Notes in Computer Science, page 131-143. Springer, (2010)Assessment of visual space recognition in patients with unilateral spatial neglect using head mounted display (HMD) system: Case study with left unilateral spatial neglect., , , , and . SII, page 712-716. IEEE, (2013)