Author of the publication

Design of NFC Based Micro-payment to Support MD Authentication and Privacy for Trade Safety in NFC Applications.

, and . CISIS, page 710-713. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improvement of Anomaly Intrusion Detection Performance by Indirect Relation for FTP Service., and . IWANN, volume 4507 of Lecture Notes in Computer Science, page 895-902. Springer, (2007)Design of Connected Data Lake System based on Micro Cloud Storage., , , , , and . ICTC, page 917-918. IEEE, (2018)International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework., , , , and . Secur. Commun. Networks, (2018)Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future Internet., and . DASC, page 1046-1050. IEEE Computer Society, (2011)Performance Testing of Mass Distributed Abyss Storage Prototype for SMB., , , and . CISIS, volume 611 of Advances in Intelligent Systems and Computing, page 762-767. Springer, (2017)Random password generation of OTP system using changed location and angle of fingerprint features., , and . CIT, page 420-425. IEEE Computer Society, (2008)Design of Attribute-Based Access Control in Cloud Computing Environment., , and . ICITCS, volume 120 of Lecture Notes in Electrical Engineering, page 41-50. Springer, (2011)Secured mVoIP Service over Cloud and Container-Based Improvement., , , and . AINA, page 791-795. IEEE Computer Society, (2015)Design of NFC Based Micro-payment to Support MD Authentication and Privacy for Trade Safety in NFC Applications., and . CISIS, page 710-713. IEEE Computer Society, (2013)Study of Digital License Search for Intellectual Property Rights of S/W Source Code., , and . ICCSA (3), volume 4707 of Lecture Notes in Computer Science, page 201-212. Springer, (2007)