Author of the publication

Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network.

, , and . ICIC (3), volume 2 of Communications in Computer and Information Science, page 1110-1118. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism., , , , and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 915-924. Springer, (2004)A Study on the Quantitative Design and Documentation for the VR Based Training Contents Realism., , and . MUE/FutureTech, volume 448 of Lecture Notes in Electrical Engineering, page 573-579. (2017)XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed Computing., , , , and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 251-259. Springer, (2006)Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network., , and . ICIC (3), volume 2 of Communications in Computer and Information Science, page 1110-1118. Springer, (2007)Efficient Exponentiation in GF(pm) Using the Frobenius Map., , , and . ICCSA (4), volume 3983 of Lecture Notes in Computer Science, page 584-593. Springer, (2006)An enhanced LBS security protocol in wireless networks., , , and . IGARSS, page 1594-1597. IEEE, (2005)XML-Based Digital Signature Accelerator in Open Mobile Grid Computing., , , , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 323-333. Springer, (2005)Security Frameworks for Open LBS Based on Web Services Security Mechanism., , , , and . ISPA Workshops, volume 3759 of Lecture Notes in Computer Science, page 609-618. Springer, (2005)A Location Privacy Protection Mechanism for Smart Space., , , , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 162-173. Springer, (2003)A DPA Countermeasure by Randomized Frobenius Decomposition., , , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 271-282. Springer, (2005)