Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep rank hashing network for cancellable face identification., , , , and . Pattern Recognit., (2022)On modeling system-centric information for role engineering., , , and . SACMAT, page 169-178. ACM, (2003)A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation., , , and . SAC, page 325-330. ACM, (2003)A Performance Comparison of Loss Functions., , , and . ICTC, page 1146-1151. IEEE, (2019)End-to-end Korean Digits Speech Recognition., , , and . ICTC, page 1137-1139. IEEE, (2019)A Location Privacy Protection Mechanism for Smart Space., , , , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 162-173. Springer, (2003)Authentication and Authorization for Network Security Service., , and . Security and Management, page 84-88. CSREA Press, (2004)A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection., , , , , and . MONAMI, volume 235 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 378-389. Springer, (2017)Lightweight Signature-based Range Proof., , and . ICTC, page 1862-1865. IEEE, (2022)A role-based infrastructure management system: design and implementation., , , and . Concurr. Pract. Exp., 16 (11): 1121-1141 (2004)