Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation on data management approach for multiple clouds using secret sharing scheme., , and . ICCE, page 471-473. IEEE, (2016)Automatic LOD conversion system of tweet data associated with tourist spots., , , , , , and . GCCE, page 1-2. IEEE, (2016)Dynamic Authentication Method Dependent on Surrounding Environment., , , and . GCCE, page 855-857. IEEE, (2018)A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud., , , , , and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 888-900. Springer, (2017)Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines., , , , , , and . NBiS, volume 1036 of Advances in Intelligent Systems and Computing, page 413-422. Springer, (2019)A Concept Proposal on Modeling of Security Fatigue Level., , , , , and . ACIT/CSII/BCD, page 29-34. IEEE, (2017)A Distributed Log Management Method using a Blockchain Scheme., , and . ICCE, page 1-3. IEEE, (2020)Communication Robot for Elderly Based on Robotic Process Automation., , , , , and . COMPSAC (2), page 251-256. IEEE, (2019)Considerations for Using DPDK in a Hypervisor Virtual Environment., and . NBiS, volume 1264 of Advances in Intelligent Systems and Computing, page 261-268. Springer, (2020)A Study of Cost Structure Visualization for Digital Forensics Deployment., , , and . ACIT-CSI, page 428-431. IEEE, (2015)