Author of the publication

Proposal and Performance Evaluation of Hash-based Authentication for P2P Network.

, , , , and . Inf. Media Technol., 4 (2): 594-606 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On supporting handoff management for multi-source video streaming in mobile communication systems., , and . LCN, page 395-402. IEEE Computer Society, (2008)One DoF robotic hand that makes human laugh by tickling through rubbing underarm., , , , , , , , , and 1 other author(s). IROS, page 404-409. IEEE, (2016)A Dynamic Service Level Negotiation Mechanism for QoS Provisioning in NGEO Satellite Networks., , , and . ICC, page 1-6. IEEE, (2007)An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks., , , , and . ICC, page 320-325. IEEE, (2007)A Study of Bayesian Clustering of a Document Set Based on GA., , , and . SEAL, volume 1585 of Lecture Notes in Computer Science, page 260-267. Springer, (1998)Experiments on the TREC-9 Filtering Track., , , , , and . TREC, volume 500-249 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2000)Socio-familiar Personalized Service and Its Application - Towards a New Network Software for Next Generation Ubiquitous Service., , , , , and . ISADS, page 449-455. IEEE Computer Society, (2011)AI application of the Internet - Backgrounds and Issues., and . SAINT Workshops, page 273-275. IEEE Computer Society, (2003)Membership Inference Attacks against GNN-based Hardware Trojan Detection., , , , , and . TrustCom, page 1222-1229. IEEE, (2023)Query Expansion Method Based on Word Contribution (poster abstract)., , , and . SIGIR, page 303-304. ACM, (1999)