Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GA based Adaptive Sampling for Image-based Walkthrough., , and . EGVE, page 135-142. Eurographics Association, (2006)Delaunay Triangles Model for Image-Based Motion Retargeting., and . DEFORM/AVATARS, volume 196 of IFIP Conference Proceedings, page 158-168. Kluwer, (2000)A Framework for Anomaly Pattern Recognition in Electronic Financial Transaction Using Moving Average Method., , and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 93-99. Springer, (2012)Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006., , and . IACR Cryptology ePrint Archive, (2007)Random CFI (RCFI): Efficient Fine-Grained Control-Flow Integrity Through Random Verification., and . IEEE Trans. Computers, 70 (5): 733-745 (2021)Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory., and . CoRR, (2022)Protecting HRP UWB Ranging System Against Distance Reduction Attacks., , , and . CCS, page 622-635. ACM, (2023)How to Securely Record Logs based on ARM TrustZone., , , and . AsiaCCS, page 664-666. ACM, (2019)Balancing Personal Privacy and Public Safety in COVID-19: Case of Korea and France., , , and . CoRR, (2020)Reliable Cooperative Authentication for Vehicular Networks., , and . IEEE Trans. Intell. Transp. Syst., 19 (4): 1065-1079 (2018)