Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new proposal for a digital evidence container for security convergence., , and . ICCSCE, page 171-175. (2011)Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile., , , and . APWeb/WAIM Workshops, volume 4537 of Lecture Notes in Computer Science, page 573-582. Springer, (2007)The encryption method to share a secret binary image and its decryption system., , and . ISICT, volume 49 of ACM International Conference Proceeding Series, page 94-99. Trinity College Dublin, (2003)The Traceback Method about DoS Attack in Open Grid Computing Environment., , , , and . FGCN (1), page 391-394. IEEE Computer Society, (2008)Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks., , and . EUC, volume 4096 of Lecture Notes in Computer Science, page 131-140. Springer, (2006)An efficient tracking system using adaptive approach for online feature selection., and . ICTC, page 763-764. IEEE, (2012)Security Framework for Home Network: Authentication, Authorization, and Security Policy., , , , and . PAKDD Workshops, volume 4819 of Lecture Notes in Computer Science, page 621-628. Springer, (2007)Fine-level moving object detection using region-based background/foreground model., and . ICTC, page 761-762. IEEE, (2012)A Study on Reliable Communication in ATN Environment., and . IKE, page 370-373. CSREA Press, (2009)Compact Design of a Combined MixColumn/InvMixColumn Transformation Module for AES., and . CDES, page 38-41. CSREA Press, (2009)