Author of the publication

Protection method from APP repackaging attack on mobile device with separated domain.

, , , and . ICTC, page 667-668. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of KOMPSAT-2 to the detection of microphytobenthos in tidal flats., , and . IGARSS, page 4. IEEE, (2005)Speech enhancement by Kalman filtering with a particle filter-based preprocessor., , and . ICCE, page 340-341. IEEE, (2013)Secure mobile device structure for trust IoT., , , and . J. Supercomput., 74 (12): 6646-6664 (2018)Self Location Estimation Scheme Using ROA in Wireless Sensor Networks., , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 1169-1177. Springer, (2005)Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile., , , and . APWeb/WAIM Workshops, volume 4537 of Lecture Notes in Computer Science, page 573-582. Springer, (2007)Cross-Cultural Exploration of Music Sharing., , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-28 (2022)Anonymous Authentication System Using Group Signature., , , , and . CISIS, page 1235-1239. IEEE Computer Society, (2009)Intelligent Home Network Authentication: S/Key-Based Home Device Authentication., , , , , and . ISPA Workshops, volume 4743 of Lecture Notes in Computer Science, page 214-223. Springer, (2007)Ground truth estimation of spoken english fluency score using decorrelation penalized low-rank matrix factorization., , and . ASRU, page 445-449. IEEE, (2017)Protection method from APP repackaging attack on mobile device with separated domain., , , and . ICTC, page 667-668. IEEE, (2014)