Author of the publication

A Secret Key Updating Method between Devices for Secure Smart Services.

, and . ICTC, page 946-948. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security policy specification for home network., , , and . Int. J. Ad Hoc Ubiquitous Comput., 4 (6): 372-378 (2009)Early Wildfire Detection Using Convolutional Neural Network., , , and . IW-FCV, volume 1212 of Communications in Computer and Information Science, page 18-30. Springer, (2020)Security model for video surveillance system., and . ICTC, page 100-104. IEEE, (2012)Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing., , , and . PDCAT, volume 931 of Communications in Computer and Information Science, page 84-89. Springer, (2018)De-identification and restoration methods for protecting privacy in off-line documents., , and . ICTC, page 1543-1545. IEEE, (2020)Pado: A Data Processing Engine for Harnessing Transient Resources in Datacenters., , , , , , , and . EuroSys, page 575-588. ACM, (2017)Extraction of Meta-Data for Recommendation Using Keyword Mapping., , , and . IEEE Access, (2024)A Secret Key Updating Method between Devices for Secure Smart Services., and . ICTC, page 946-948. IEEE, (2018)Efficient pricing of Bermudan options using recombining quadratures., , and . J. Comput. Appl. Math., (2014)Artificial Intelligence-Based Plant Breeding using Genotype and Phenotype Data: Methods and Future Work., , , , , , , and . IEEE Big Data, page 3458-3463. IEEE, (2023)