Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks., and . WISA, volume 7115 of Lecture Notes in Computer Science, page 203-218. Springer, (2011)Low-priced and efficient replica detection framework for wireless sensor networks., and . Peer-to-Peer Netw. Appl., 7 (4): 743-749 (2014)Balance between Performance and Security in IPI-based Key Schemes using Heartbeats., and . ICSPS, page 13-17. ACM, (2017)A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange., , , , and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 353-358. Springer, (2018)A Performance Comparison of Loss Functions., , , and . ICTC, page 1146-1151. IEEE, (2019)End-to-end Korean Digits Speech Recognition., , , and . ICTC, page 1137-1139. IEEE, (2019)Energy-efficient replica detection for resource-limited mobile devices in the internet of things., , , and . IET Commun., 7 (18): 2141-2150 (2013)Study on peak misdetection recovery of key exchange protocol using heartbeat., , , , and . J. Supercomput., 75 (6): 3288-3301 (2019)A Study on the Security Vulnerabilities of Fuzzy Vault Based on Photoplethysmogram., , and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 359-365. Springer, (2018)Client cloud Web service: reducing traffic consumption., , , and . Secur. Commun. Networks, 9 (3): 248-261 (2016)