Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of a Risk-Based Management Method for Online Accounts., , , and . CyberSec, page 52-57. IEEE Computer Society, (2015)Proposal of a watermarking scheme using winding number and unneeded synchronism., , and . ISITA, page 802-805. IEEE, (2012)Fast Implementation of the Advanced Encryption Standard Using Atmega1281., , and . ARES, page 342-346. IEEE Computer Society, (2011)Security and Privacy Behavior Definition for Behavior Driven Development., , , , , , and . PROFES, volume 8892 of Lecture Notes in Computer Science, page 306-309. Springer, (2014)Experiment of Geometrically Invariant and Unneeded Synchronism Watermarking Using Winding Number., , , and . AINA Workshops, page 877-882. IEEE Computer Society, (2013)Identifier Migration for Identity Continuance in Single Sign-On., , and . J. Information Security, 3 (4): 307-313 (2012)A Mixed Content Awareness Tool for Safe Browsing., , and . J. Comput., 13 (1): 90-99 (2018)A Method of An Anonymous Authentication For Flat-rate Service., , and . J. Comput., 1 (8): 36-42 (2006)Identity Continuance in Single Sign-On with Authentication Server Failure., , and . IMIS, page 597-602. IEEE Computer Society, (2011)Identifier Migration in OpenID., , and . IMIS, page 612-617. IEEE Computer Society, (2011)