Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An eating speed guide system using a wristband and tabletop unit., , , , , and . UbiComp Adjunct, page 121-124. ACM, (2016)SCTP over High Speed Wide Area Networks., , , and . ICN (1), volume 3420 of Lecture Notes in Computer Science, page 628-634. Springer, (2005)Design of Disaster Collection and Analysis System Using Crowd Sensing and Beacon Based on Hadoop Framework., , , , , and . ICCSA (4), volume 9158 of Lecture Notes in Computer Science, page 106-116. Springer, (2015)Study on Encryption of Wireless Network-Based Mobility Energy-Enterprise Security Management., , , , , and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 221-227. Springer, (2014)Comparison & Analysis of HIGHT and SEED for the Protection of Biometric Information at U-Wellness Healthcare System., , , , , and . ICISA, page 1-4. IEEE, (2013)Development of Mobile Hybrid MedIntegraWeb App for Interoperation between u-RPMS and HIS., , , , and . ICCSA (3), volume 7335 of Lecture Notes in Computer Science, page 248-258. Springer, (2012)A Security Framework for Secure Home Networking in Ubiquitous Computing., , , , and . IPC, page 394-397. IEEE Computer Society, (2007)Mobile Based HIGHT Encryption for Secure Biometric Information Transfer of USN Remote Patient Monitoring System., , and . ICCSA (5), volume 6786 of Lecture Notes in Computer Science, page 83-95. Springer, (2011)Fulltext-Image Watermarking Using Improved DWT and HVS Based on JPEG Compression., , , and . AWIC, volume 3528 of Lecture Notes in Computer Science, page 254-259. Springer, (2005)"Reminder: please update your details": Phishing Trends., , and . NetCoM, page 295-300. IEEE Computer Society, (2009)