Author of the publication

Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService.

, , , , and . IEEE Trans. Mob. Comput., 9 (6): 824-837 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dual projection-based VR system for the light weight motion-based driving simulator., , , and . VRST, page 195-198. ACM, (2000)Privacy Enhanced Location Sharing for Mobile Online Social Networks., , , , , and . IEEE Trans. Sustain. Comput., 5 (2): 279-290 (2020)Less Communication: Energy-Efficient Key Exchange for Securing Implantable Medical Devices., , , , , , and . Secur. Commun. Networks, (2018)IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances., and . Comput. Secur., (October 2023)Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol., , and . Comput. Secur., (March 2023)Protecting SOME/IP Communication via Authentication Ticket., , and . Sensors, 23 (14): 6293 (July 2023)High Precision Classification of Resting and Eating Behaviors of Cattle by Using a Collar-Fitted Triaxial Accelerometer Sensor., , , , , and . Sensors, 22 (16): 5961 (2022)Cyberattack Models for Ship Equipment Based on the MITRE ATT&CK Framework., , , , and . Sensors, 22 (5): 1860 (2022)Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol., , and . IEEE Commun. Lett., 10 (9): 683-685 (2006)Security flaw of authentication scheme with anonymity for wireless communications., , and . IEEE Commun. Lett., 13 (5): 292-293 (2009)