Author of the publication

Development of Force Observer in Series Elastic Actuator for Dynamic Control.

, , and . IEEE Trans. Ind. Electron., 65 (3): 2398-2407 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient One-time Signature Schemes for Stream Authentication., and . J. Inf. Sci. Eng., 22 (3): 611-624 (2006)PCS: a parity-based personal data recovery service in cloud., , , and . Clust. Comput., 20 (3): 2655-2668 (2017)Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks., , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 731-732. Springer, (2006)A robust and flexible digital rights management system for home networks., , and . J. Syst. Softw., 83 (12): 2431-2440 (2010)Reactive Key Management Scheme for Access Control in Group Communications., , , and . IEICE Trans. Commun., 90-B (4): 982-986 (2007)Framework Design and Performance Analysis on Pairwise Key Establishment., and . APNOMS, volume 5787 of Lecture Notes in Computer Science, page 311-320. Springer, (2009)Analyzing Network Privacy Preserving Methods: A Perspective of Social Network Characteristics., , , , and . IEICE Trans. Inf. Syst., 97-D (6): 1664-1667 (2014)A New Proxy Signature Scheme Providing Self-delegation., , , and . ICISC, volume 4296 of Lecture Notes in Computer Science, page 328-342. Springer, (2006)Hybrid Modeling for Large-Scale Worm Propagation Simulations., , , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 572-577. Springer, (2006)Intrusion Detection Using Noisy Training Data., , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 547-556. Springer, (2004)