Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on a very low bit-rate video coding algorithm., , and . VCIP, volume 2094 of SPIE Proceedings, SPIE, (1993)Adopting IPsec to SIP Network for On-Demand VPN Establishment between Home Networks., , , , , and . GLOBECOM, page 5672-5676. IEEE, (2008)Cryptographic alias e-mail addresses for privacy enforcement in business outsourcing., , , and . Digital Identity Management, page 46-53. ACM, (2005)Adaptation of the MPEG video-coding algorithm to network applications., , , and . IEEE Trans. Circuits Syst. Video Techn., 3 (4): 261-269 (1993)An authentication method for interaction between personal servers based on the exchange of addresses., , and . Digital Identity Management, page 63-69. ACM, (2005)IOWN for digital twin enabled societies.. OFC, page 1-3. IEEE, (2022)Fast WDM provisioning with minimal probing: the first field experiments for DC exchanges., , , , , , , , , and 9 other author(s). J. Opt. Commun. Netw., 16 (2): 233-242 (February 2024)Spam Filtering with Cryptographic Ad-hoc E-mail Addresses., , , and . SAINT Workshops, page 114-117. IEEE Computer Society, (2005)Safe and Secure Services Based on NGN., , , , and . IEICE Trans. Inf. Syst., 91-D (5): 1226-1233 (2008)Dial-to-Connect VPN System for Remote DLNA Communication., , , and . CCNC, page 1224-1225. IEEE, (2008)