Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile., , , and . APWeb/WAIM Workshops, volume 4537 of Lecture Notes in Computer Science, page 573-582. Springer, (2007)Self Location Estimation Scheme Using ROA in Wireless Sensor Networks., , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 1169-1177. Springer, (2005)Speech enhancement by Kalman filtering with a particle filter-based preprocessor., , and . ICCE, page 340-341. IEEE, (2013)Secure mobile device structure for trust IoT., , , and . J. Supercomput., 74 (12): 6646-6664 (2018)Application of KOMPSAT-2 to the detection of microphytobenthos in tidal flats., , and . IGARSS, page 4. IEEE, (2005)Cross-Cultural Exploration of Music Sharing., , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-28 (2022)Anonymous Authentication System Using Group Signature., , , , and . CISIS, page 1235-1239. IEEE Computer Society, (2009)Implementation of TLS and DTLS on Zephyr OS for IoT Devices., , and . ICTC, page 1292-1294. IEEE, (2018)Implementation of an Elliptic Curve Cryptography Hardware Accelerator for Smart Cards., , , , , and . Security and Management, page 607-610. CSREA Press, (2003)Single-channel speech separation using phase-based methods., , and . IEEE Trans. Consumer Electronics, 56 (4): 2453-2459 (2010)