Author of the publication

Group Signature with Signer-Controlled Opening Capability: Separate Token Generator.

, and . CSA/CUTE, volume 474 of Lecture Notes in Electrical Engineering, page 883-887. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is Implicit Authentication on Smartphones Really Popular? On Android Users' Perception of "Smart Lock for Android"., , , and . MobileHCI, page 20:1-20:17. ACM, (2020)On the Guessability of Resident Registration Numbers in South Korea., , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 128-138. Springer, (2016)Design of a Shipboard Outside Communication Network and the Test Bed Using PLC: for the Workers' Safety Management During Ship-Building process., , and . IMCOM, page 43:1-43:6. ACM, (2016)A Method of Modeling of Basic Big Data Analysis for Korean Medical Tourism: A Machine Learning Approach Using Apriori Algorithm., , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 784-790. Springer, (2017)A distributed monitoring architecture for AMIs: minimizing the number of monitoring nodes and enabling collided packet recovery., , , and . SEGS@CCS, page 35-40. ACM, (2013)A Study on the RFID and 2D Barcode, and NFC and Performance Improvement., and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 773-779. Springer, (2018)ResMax: Detecting Voice Spoofing Attacks with Residual Network and Max Feature Map., , , , , , , and . ICPR, page 4837-4844. IEEE, (2020)A Design of Scheduling Program for Diabetic Patients: A Software Engineering Approach., , and . CSA/CUTE, volume 474 of Lecture Notes in Electrical Engineering, page 198-203. Springer, (2017)Understanding Edge Computing: Engineering Evolution With Artificial Intelligence., and . IEEE Access, (2019)Design of a Framework to Detect Device Spoofing Attacks Using Network Characteristics., , , and . IEEE Consumer Electronics Magazine, 9 (2): 34-40 (2020)