Author of the publication

A Secure Mobile Agent System Based on Identity-Based Digital Signature Scheme.

, , and . Security and Management, page 479-485. CSREA Press, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-orthogonal Embedding for Efficient Unsupervised Anomaly Segmentation., , , and . CoRR, (2021)A Secure Mobile Agent System Based on Identity-Based Digital Signature Scheme., , and . Security and Management, page 479-485. CSREA Press, (2003)Application of Block Design to a Load Balancing Algorithm on Distributed Networks., , , and . ICCSA (2), volume 3044 of Lecture Notes in Computer Science, page 178-185. Springer, (2004)Solving Box-Pushing Games via Model Checking with Optimizations., and . ATVA, volume 3299 of Lecture Notes in Computer Science, page 491-494. Springer, (2004)Constructing novel datasets for intent detection and ner in a korean healthcare advice system: guidelines and empirical results., , and . Appl. Intell., 53 (1): 941-961 (2023)Adaptive Fault Detection and Emergency Control of Autonomous Vehicles for Fail-Safe Systems Using a Sliding Mode Approach., , , , , and . IEEE Access, (2022)The Memory Palace: Exploring Visual-Spatial Paths for Strong, Memorable, Infrequent Authentication., , , , and . UIST, page 1109-1121. ACM, (2019)Design of a Reliable NAND Flash Software for Mobile Device., , , and . CIT, page 173. IEEE Computer Society, (2006)Correction: Deep learning model for differentiating nasal cavity masses based on nasal endoscopy images., , , , , , , , , and . BMC Medical Informatics Decis. Mak., 24 (1): 150 (December 2024)Examining Visual-Spatial Paths for Mobile Authentication., , , and . WAY@SOUPS, USENIX Association, (2016)