Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The home device authentication system construction for pervasive home network., , , and . MobiQuitous, ICST / ACM, (2008)Editorial: Special Issue on "Security and Multimodality in Pervasive Environments"., , , and . Wirel. Pers. Commun., 55 (1): 1-4 (2010)Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing., , and . Personal and Ubiquitous Computing, 17 (5): 921-932 (2013)A Study on Key Distribution and ID Registration in the AAA System for Ubiquitous Multimedia Environments., , and . MMM (2), volume 4352 of Lecture Notes in Computer Science, page 487-493. Springer, (2007)Device Authentication/Authorization Protocol for Home Network in Next Generation Security., , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 760-768. Springer, (2009)Flight Protection Data via Dynamic Sensor Networks., and . IJDSN, (2014)A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment., , , , and . ICHIT, volume 4413 of Lecture Notes in Computer Science, page 395-403. Springer, (2006)Time Stamp Protocol for Smart Environment Services., , , , and . UIC, volume 5061 of Lecture Notes in Computer Science, page 591-601. Springer, (2008)Improvement of Lung Segmentation Using Volume Data and Linear Equation., , , and . ITCS, volume 253 of Lecture Notes in Electrical Engineering, page 213-221. Springer, (2013)User Authentication for Multi Domain in Home Network Environments., , and . MUE, page 89-96. IEEE Computer Society, (2007)