Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Network for Copyright Management and Control of Private Information., and . SAINT, page 448-451. IEEE Computer Society, (2008)CNN-based perceptual hashing scheme for image groups suitable for security systems., , , , , and . COMPSAC, page 1231-1236. IEEE, (2023)A Local Currency System Reflecting Variety of Values., , , , and . SAINT, page 562-567. IEEE Computer Society, (2011)Game theoretic analysis of the value exchange system., , , and . COMPSAC Workshops, page 300-305. IEEE Computer Society, (2013)An access control model considering with transitions of access rights based on the blockchain., and . COMPSAC, page 1792-1797. IEEE, (2022)A System for Search, Access Restriction, and Agents in the Clouds., , and . SAINT, page 201-204. IEEE Computer Society, (2009)Financial Securitization with Digital Rights Management System., , and . SAINT, page 197-200. IEEE Computer Society, (2009)A Local Currency System Reflecting Variety of Values with a Swarm Intelligence., , , , , and . SAINT, page 251-255. IEEE Computer Society, (2012)An Improved Design Scheme for Perceptual Hashing Based on CNN for Digital Watermarking., , , and . COMPSAC, page 1789-1794. IEEE, (2020)Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain., , , and . COMPSAC (2), page 359-364. IEEE Computer Society, (2018)978-1-5386-2667-2.