Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile., , , and . Comput. J., 52 (8): 871-877 (2009)Intelligent Home Network Authentication: Home Device Authentication Using Device Certification., , , , and . OTM Conferences (2), volume 4804 of Lecture Notes in Computer Science, page 1688-1700. Springer, (2007)Secure mobile services using secure region., and . ICTC, page 894-895. IEEE, (2013)Fade-in Reverberation in Multi-room Environments Using the Common-Slope Model., , , , , and . CoRR, (2024)Secure mobile device structure for trust IoT., , , and . J. Supercomput., 74 (12): 6646-6664 (2018)Cross-Cultural Exploration of Music Sharing., , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-28 (2022)Speech enhancement by Kalman filtering with a particle filter-based preprocessor., , and . ICCE, page 340-341. IEEE, (2013)Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile., , , and . APWeb/WAIM Workshops, volume 4537 of Lecture Notes in Computer Science, page 573-582. Springer, (2007)Application of KOMPSAT-2 to the detection of microphytobenthos in tidal flats., , and . IGARSS, page 4. IEEE, (2005)Anonymous Authentication System Using Group Signature., , , , and . CISIS, page 1235-1239. IEEE Computer Society, (2009)