Author of the publication

New Anti-phishing Method with Two Types of Passwords in OpenID System.

, , , , and . ICGEC, page 69-72. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A reinforcement learning approach to map reduce auto-configuration under networked environment., , , and . Int. J. Secur. Networks, 12 (3): 135-140 (2017)Real-Time Continuous Image Registration Enabling Ultraprecise 2-D Motion Tracking., and . IEEE Trans. Image Processing, 22 (5): 2081-2090 (2013)Learning-Based Computation Offloading for IoT Devices With Energy Harvesting., , , , , and . IEEE Trans. Vehicular Technology, 68 (2): 1930-1941 (2019)Indoor Navigation Leveraging Gradient WiFi Signals., , , , and . SenSys, page 48:1-48:2. ACM, (2017)Limited Feedback Unitary Precoding for MIMO Full Stream Transmission., , , , and . IEEE Trans. Vehicular Technology, 63 (8): 4092-4096 (2014)Minimizing charging delay in wireless rechargeable sensor networks., , , , and . INFOCOM, page 2922-2930. IEEE, (2013)Sensor scheduling with limited communication energy and bandwidth., , and . ICARCV, page 537-542. IEEE, (2010)Event-based attack against remote state estimation., , , and . CDC, page 6844-6849. IEEE, (2015)Methods of making dynamic thematic maps of agricultural products price., , and . Geoinformatics, page 1-5. IEEE, (2010)The effects of temperature gradient on transient behavior of low-range differential air pressure calibration setup., , and . ICIT, page 1488-1494. IEEE, (2015)