Author of the publication

A user authenticaion scheme using multiple passphrases and its arrangement.

, , , and . ISITA, page 554-559. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extracting refrained phrases from music signals using a frequent episode pattern mining algorithm., , and . GrC, page 199-202. IEEE Computer Society, (2011)Dynamic Behavior of Multiagents with Subjective Cooperative Relations., , and . ICOIN (2), volume 2344 of Lecture Notes in Computer Science, page 634-643. Springer, (2002)AWide Area Log Analyzing System Based on Mobile Agents., , , , , , and . CIMCA/IAWTIC, page 26. IEEE Computer Society, (2006)DoS Packet Filter Using DNS Information., , , and . AINA (1), page 116-131. IEEE Computer Society, (2006)An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks., , , and . DEXA Workshops, page 66-70. IEEE Computer Society, (2006)A New Approach to Early Detection of an Unknown Worm., , , and . AINA Workshops (1), page 194-198. IEEE Computer Society, (2007)A Polynomial-Delay Polynomial-Space Algorithm for Extracting Frequent Diamond Episodes from Event Sequences., , and . PAKDD, volume 5476 of Lecture Notes in Computer Science, page 172-183. Springer, (2009)Virtualization Technology for Ubiquitous Databases., , , , and . CISIS, page 555-560. IEEE Computer Society, (2010)A Simple Characterization on Serially Constructible Episodes., and . PAKDD, volume 5012 of Lecture Notes in Computer Science, page 600-607. Springer, (2008)A Proposal of P2P Content Retrieval System Using Access-Based Grouping Technique., , , , , and . KES (3), volume 6278 of Lecture Notes in Computer Science, page 455-463. Springer, (2010)