Author of the publication

New Anti-phishing Method with Two Types of Passwords in OpenID System.

, , , , and . ICGEC, page 69-72. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perceptual codec and interaction aware playout algorithms and quality measurements for VoIP systems., , and . IEEE Trans. Consumer Electronics, 50 (1): 297-305 (2004)A Robust Multilevel Speech Verification With Wavelet Decomposition for Inadequate Training Data Sets of Mobile Device Systems., , , , , and . IEEE Access, (2019)Autonomous Driving for Natural Paths Using an Improved Deep Reinforcement Learning Algorithm., , , , and . IEEE Trans. Aerosp. Electron. Syst., 58 (6): 5118-5128 (2022)Recent advances in artificial intelligence for video production system., , , , , and . Enterp. Inf. Syst., (November 2023)PaDE: An enhanced Differential Evolution algorithm with novel control parameter adaptation schemes for numerical optimization., , and . Knowl. Based Syst., (2019)Biometric Electrocardiogram Card for Access Control System., , , , , , and . ICGEC, page 373-376. IEEE Computer Society, (2011)Wavelet-Based Entropy for Digital Audio Watermarking., , , , , and . IIH-MSP, page 61-64. IEEE Computer Society, (2011)BRBA: A Blocking-Based Association Rule Hiding Method., , , , and . AAAI, page 4200-4201. AAAI Press, (2016)Deterministic high-speed root-hashing automaton matching coprocessor for embedded network processor., , , and . SIGARCH Comput. Archit. News, 35 (3): 36-43 (2007)Modeling and analysis of core-centric network processors., , , and . ACM Trans. Embed. Comput. Syst., 8 (2): 13:1-13:15 (2009)