Author of the publication

Security Frameworks for Open LBS Based on Web Services Security Mechanism.

, , , , and . ISPA Workshops, volume 3759 of Lecture Notes in Computer Science, page 609-618. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism., , , , and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 915-924. Springer, (2004)A Study on the Quantitative Design and Documentation for the VR Based Training Contents Realism., , and . MUE/FutureTech, volume 448 of Lecture Notes in Electrical Engineering, page 573-579. (2017)XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing., , , , and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 251-259. Springer, (2006)A DPA Countermeasure by Randomized Frobenius Decomposition., , , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 271-282. Springer, (2005)A Location Privacy Protection Mechanism for Smart Space., , , , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 162-173. Springer, (2003)Security Frameworks for Open LBS Based on Web Services Security Mechanism., , , , and . ISPA Workshops, volume 3759 of Lecture Notes in Computer Science, page 609-618. Springer, (2005)Forensics for Korean cell phone., , and . e-Forensics, page 30. ICST/ACM, (2008)A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services., , , , and . ICWE, volume 3579 of Lecture Notes in Computer Science, page 191-196. Springer, (2005)XKMS-Based Key Management for Open LBS in Web Services Environment., , , , and . AWIC, volume 3528 of Lecture Notes in Computer Science, page 367-373. Springer, (2005)Design and Implementation of Crypto Co-processor and Its Application to Security Systems., , , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 1104-1109. Springer, (2005)