Author of the publication

User Authentication Algorithm Guaranteeing Reusability of Biometric Data in BioPKI System.

, and . Wireless Personal Communications, 93 (1): 67-79 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Authentication Algorithm Guaranteeing Reusability of Biometric Data in BioPKI System., and . Wireless Personal Communications, 93 (1): 67-79 (2017)An Empirical Study of Spam and Spam Vulnerable email Accounts., , and . FGCN (1), page 408-413. IEEE Computer Society, (2007)Study on IP Traceback System for DDoS., , and . ICEIS (3-1), page 279-282. (2008)Efficient Authentication Framework in Ubiquitous Robotic Companion., , and . J. Inform. and Commun. Convergence Engineering, 7 (1): 13-18 (2009)A Security Framework for Ubiquitous Computing Environment., , and . J. Inform. and Commun. Convergence Engineering, 7 (3): 330-334 (2009)Information Interoperability System Using Multi-agent with Security., , and . Wirel. Pers. Commun., 89 (3): 819-832 (2016)A study on secure user authentication and authorization in OAuth protocol., , and . Clust. Comput., 22 (Suppl 1): 1991-1999 (2019)A Security Framework for Secure Home Networking in Ubiquitous Computing., , , , and . IPC, page 394-397. IEEE Computer Society, (2007)A privacy data leakage prevention method in P2P networks., , , , and . Peer-to-Peer Netw. Appl., 9 (3): 508-519 (2016)Enhanced secure device authentication algorithm in P2P-based smart farm system., and . Peer-to-Peer Netw. Appl., 11 (6): 1230-1239 (2018)