Author of the publication

Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy.

, , and . SpringSim (3), page 362-369. SCS/ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neural network simulation on shared-memory vector multiprocessors., , and . SC, page 197-204. ACM, (1989)Using dipole receptive fields for the reconstruction of printed characters., and . Neurocomputing, 6 (3): 327-342 (1994)Introducing rotation invariance into the Neocognitron model for target recognition., and . Pattern Recognit. Lett., 14 (12): 985-995 (1993)A Fully Vectorized Code for Nonequilibrium Rf Glow Discharge Fluid Modeling and Its Parallel Processing On a Cray X-Mp., and . Int. J. High Perform. Comput. Appl., 7 (1): 50-63 (1993)Adaptive color image processing and recognition for varying backgrounds and illumination conditions., and . IEEE Trans. Ind. Electron., 45 (2): 351-357 (1998)Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information., and . IEEE Trans. Ind. Informatics, 2 (1): 40-47 (2006)Concurrent and vectorized Monte Carlo simulation of the evolution of an assembly of particles increasing in number., and . SC, page 205-214. ACM, (1989)Localized authentication for wireless LAN inter-networking roaming., , and . WCNC, page 264-267. IEEE, (2004)Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation., , and . Int. J. Netw. Secur., 6 (3): 331-341 (2008)Shorten Turnaround Time for Two-Dimensional Plasma Processing Simulations via Vectorization and Parallelization Techniques., , and . PPSC, page 237-238. SIAM, (1995)