Author of the publication

An approach to protect Private Key using fingerprint Biometric Encryption Key in BioPKI based security system.

, and . ICARCV, page 1595-1599. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approach to protect Private Key using fingerprint Biometric Encryption Key in BioPKI based security system., and . ICARCV, page 1595-1599. IEEE, (2008)On Performance of Full-Duplex Decode-and-Forward Relay Systems with an Optimal Power Setting under the Impact of Hardware Impairments., , , , and . Wirel. Commun. Mob. Comput., (2020)Factors Influencing the Use of Digital Games in Teaching: An Exploratory Study in the Context of Digital Transformation in Northern Vietnam., , , , and . Int. J. Emerg. Technol. Learn., 18 (8): 164-182 (April 2023)A Mixed Strategy for a Competitive Game in Delay Tolerant Networks., , and . EPEW, volume 11178 of Lecture Notes in Computer Science, page 190-204. Springer, (2018)Performance of a Fixed Reward Incentive Scheme for Two-hop DTNs with Competing Relays., , and . ACM Trans. Model. Perform. Evaluation Comput. Syst., 4 (2): 12:1-12:19 (2019)Analysis of Students' Ability to Accept M-Learning Technology: An Exploratory Study from High Schools in Vietnam., , , , and . Int. J. Interact. Mob. Technol., 15 (12): 86 (June 2021)Priority and Traffic-Aware Contention-Based Medium Access Control Scheme for Multievent Wireless Sensor Networks., , , , and . IEEE Access, (2022)Hybrid Routing Protocol and Dynamic Delivering Scheme for MultiEvent Wireless Sensor Network., and . SoICT, page 286-292. ACM, (2017)Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats., , , and . WiOpt, page 1-8. IEEE, (2019)Mean-field limit of the fixed-reward incentive mechanism in delay tolerant networks., , and . WiOpt, page 1-8. IEEE, (2018)