From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Highly Annotated Whole-Genome Sequence of a Korean Individual, , , , , , , , , и 35 other автор(ы). Nature, 460 (7258): 1011--1015 (августа 2009)A Secure Communication Protocol for Drones and Smart Objects., , и . AsiaCCS, стр. 249-260. ACM, (2015)An efficient certificateless cryptography scheme without pairing., , , и . CODASPY, стр. 181-184. ACM, (2013)A Security Framework for a Drone Delivery Service., , , , и . DroNet@MobiSys, стр. 29-34. ACM, (2016)An Access Control Mechanism for Remote Control of Home Security System., и . IMIS, стр. 93-98. IEEE Computer Society, (2012)Potential vulnerability analysis of mobile banking applications., , , и . ICTC, стр. 1114-1115. IEEE, (2013)A Comparison of NIST 2nd Round Candidates' MQ-based Signature Schemes., , и . ICTC, стр. 41-46. IEEE, (2019)A Privacy-Preserving Payment Model for EV Charging., , и . WISA, том 13009 из Lecture Notes in Computer Science, стр. 255-264. Springer, (2021)POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures., , и . CODASPY, стр. 143-146. ACM, (2014)Analysis on Maliciousness for Mobile Applications., , и . IMIS, стр. 126-129. IEEE Computer Society, (2012)