From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Policy and role based mobile RFID user privacy data management system., , и . NOMS, стр. 1003-1006. IEEE, (2008)Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application., , и . Symmetry, 13 (8): 1550 (2021)A Study on De-Identification of Metering Data for Smart Grid Personal Security in Cloud Environment., и . J. Multim. Inf. Syst., 4 (4): 263-270 (2017)Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption., и . WASA, том 6221 из Lecture Notes in Computer Science, стр. 245-252. Springer, (2010)Security Frameworks for Open LBS Based on Web Services Security Mechanism., , , , и . ISPA Workshops, том 3759 из Lecture Notes in Computer Science, стр. 609-618. Springer, (2005)Mobile middleware platform for secure vessel traffic system in IoT service environment., и . Secur. Commun. Networks, 9 (6): 500-512 (2016)Certificate validation service using XKMS for computational grid., , и . XML Security, стр. 112-120. ACM, (2003)Information Technology Security Evaluation Using CERT C Secure Coding Standard., , , и . FGIT, том 7105 из Lecture Notes in Computer Science, стр. 335-342. Springer, (2011)Secure RFID Personal Data Management Using Privacy Reference Profile., , , , , и . FGIT, том 7105 из Lecture Notes in Computer Science, стр. 268-276. Springer, (2011)Development of XKMS-Based Service Component for Using PKI in XML Web Services Environment., , , и . ICCSA (1), том 3043 из Lecture Notes in Computer Science, стр. 784-791. Springer, (2004)