Author of the publication

Security Technologies Based on Home Gateway for Making Smart Home Secure.

, , , and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 124-135. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient pricing of Bermudan options using recombining quadratures., , and . J. Comput. Appl. Math., (2014)Security Framework for Home Network: Authentication, Authorization, and Security Policy., , , , and . PAKDD Workshops, volume 4819 of Lecture Notes in Computer Science, page 621-628. Springer, (2007)Artificial Intelligence-Based Plant Breeding using Genotype and Phenotype Data: Methods and Future Work., , , , , , , and . IEEE Big Data, page 3458-3463. IEEE, (2023)A Secret Key Updating Method between Devices for Secure Smart Services., and . ICTC, page 946-948. IEEE, (2018)Security model for video surveillance system., and . ICTC, page 100-104. IEEE, (2012)Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing., , , and . PDCAT, volume 931 of Communications in Computer and Information Science, page 84-89. Springer, (2018)Early Wildfire Detection Using Convolutional Neural Network., , , and . IW-FCV, volume 1212 of Communications in Computer and Information Science, page 18-30. Springer, (2020)Terra: Imperative-Symbolic Co-Execution of Imperative Deep Learning Programs., , , , , , and . CoRR, (2022)Security policy specification for home network., , , and . Int. J. Ad Hoc Ubiquitous Comput., 4 (6): 372-378 (2009)De-identification and restoration methods for protecting privacy in off-line documents., , and . ICTC, page 1543-1545. IEEE, (2020)