Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel stream cipher for secure high-speed communications, and . Signal Processing, 82 (2): 259--265 (February 2002)Development trend of insider anomaly detection system., , and . ICACT, page 373-376. IEEE, (2018)Securing distributed SDN with IBC., , , and . ICUFN, page 921-925. IEEE, (2015)Performance of Packet Analysis between Observer and WireShark., , and . ICACT, page 268-271. IEEE, (2020)Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol., , and . IACR Cryptology ePrint Archive, (2007)Blockchain Technology as a Defense Mechanism Against Data Tampering in Smart Vehicle Systems., , and . IHCI (2), volume 14532 of Lecture Notes in Computer Science, page 20-25. Springer, (2023)A Design of Elliptic Curve Cryptography-Based Authentication Using QR Code., , , , , and . CSE, page 614-619. IEEE Computer Society, (2014)Hardware Implementation and Performance Analysis of NLM-128 Stream Cipher., and . ICHIT (2), volume 206 of Communications in Computer and Information Science, page 446-453. Springer, (2011)A study on detection of anomaly behavior in automation industry., , and . ICACT, page 377-380. IEEE, (2018)Identity-based conditional proxy re-encryption without random oracles., , and . ICTC, page 349-353. IEEE, (2014)