Author of the publication

Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT.

, , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The security service rating design for IT convergence services.. Electron. Commer. Res., 13 (3): 317-328 (2013)A u-IT collaboration evaluation model for value networks., and . Personal and Ubiquitous Computing, 17 (7): 1459-1467 (2013)An exploratory research on advanced smart media security design for sustainable intelligence information system., , and . Multimedia Tools Appl., 75 (11): 6059-6070 (2016)Information security research classification for future multimedia environment., , and . Multimedia Tools Appl., 75 (22): 14795-14806 (2016)Smart IT Management Evaluation in Intelligent Environment Computing., , and . IJDSN, (2015)An Exploratory Research on Future ICT Convergence Research Design in Smart Sensor Environment., , and . IJDSN, (2015)Smart cyber society: Integration of capillary devices with high usability based on Cyber-Physical System., , , and . Future Gener. Comput. Syst., (2016)An analysis of security systems for electronic information for establishing secure internet of things environments: Focusing on research trends in the security field in South Korea., , , , and . Future Gener. Comput. Syst., (2018)On the security of a certificateless online/offline signcryption for Internet of Things., , , , and . Peer-to-Peer Netw. Appl., 8 (5): 881-885 (2015)The Development of Security System for Sharing CAD Drawings in u-Environment., , and . Comput. Informatics, 27 (5): 731-741 (2008)