Author of the publication

De-identification and restoration methods for protecting privacy in off-line documents.

, , and . ICTC, page 1543-1545. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A lightweight authentication mechanism between IoT devices., and . ICTC, page 1153-1155. IEEE, (2017)Implementation of a TCG-Based Trusted Computing in Mobile Device., , , , and . TrustBus, volume 5185 of Lecture Notes in Computer Science, page 18-27. Springer, (2008)A Secret Key Updating Method between Devices for Secure Smart Services., and . ICTC, page 946-948. IEEE, (2018)Design of an efficient image protection method based on QR code., , and . ICTC, page 1448-1450. IEEE, (2020)Improvement on TCG Attestation and Its Implication for DRM., , and . ICCSA (1), volume 4705 of Lecture Notes in Computer Science, page 912-925. Springer, (2007)Design and requirements for video encryption in intelligent surveillance system., , and . ICTC, page 763-764. IEEE, (2014)Implementation of ECC/ECDSA Cryptography Algorithms Based on Java Card., , , , and . ICDCS Workshops, page 272-278. IEEE Computer Society, (2002)Security considerations for secure and trustworthy smart home system in the IoT environment., , and . ICTC, page 1116-1118. IEEE, (2015)De-identification and restoration methods for protecting privacy in off-line documents., , and . ICTC, page 1543-1545. IEEE, (2020)Selective erasure of a fear memory., , , , , , , , , and . Science (New York, N.Y.), 323 (5920): 1492--1496 (Mar 13, 2009)