Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence., , , and . J. Supercomput., 69 (3): 1215-1234 (2014)Secure mobile device structure for trust IoT., , , and . J. Supercomput., 74 (12): 6646-6664 (2018)Adaptive authentication scheme for mobile devices in proxy MIPv6 networks., , , , and . IET Commun., 10 (17): 2319-2327 (2016)A study of the method of providing secure network channel among secure OSs., , and . ISICT, volume 49 of ACM International Conference Proceeding Series, page 345-350. Trinity College Dublin, (2003)Protection method from APP repackaging attack on mobile device with separated domain., , , and . ICTC, page 667-668. IEEE, (2014)Deterministic Task Scheduling for Embedded Real-Time Operating Systems., , , and . IEICE Trans. Inf. Syst., 87-D (2): 472-474 (2004)SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers., , , and . Mob. Inf. Syst., (2017)Design and Implementation of a Gigabit Router using Network Processor., , , , and . IMSA, page 32-35. IASTED/ACTA Press, (2005)Efficient DRM mechanism of scalable contents based on H.264/SVC in convergence environment., , and . Multimedia Tools Appl., 73 (2): 841-855 (2014)A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks., , , , , and . IEEE Access, (2019)