Author of the publication

A secure application invocation mechanism in mobile phones for Near Field Communication.

, , and . ICCE, page 731-732. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Task-role-based access control model., and . Inf. Syst., 28 (6): 533-562 (2003)Priority-Driven Secure Multiversion Locking Protocol for Real-Time Secure Database Systems., , and . DBSec, volume 113 of IFIP Conference Proceedings, page 229-244. Chapman & Hall, (1997)Two Version Concurrency Control Algorithm with Query Locking for Decision Support., and . ER Workshops, volume 1552 of Lecture Notes in Computer Science, page 157-168. Springer, (1998)An Efficient Yet Secure XML Access Control Enforcement by Safe and Correct Query Modification., and . DEXA, volume 4080 of Lecture Notes in Computer Science, page 276-285. Springer, (2006)Efficient labeling scheme of XML data considering update operations., and . CIT, page 438-443. IEEE Computer Society, (2008)Scalable and efficient web services composition based on a relational database., , , , and . J. Syst. Softw., 84 (12): 2139-2155 (2011)An Efficient Bottom-up Filtering of XML Messages by Exploiting the Postfix Commonality of XPath Queries., , and . IEICE Trans. Inf. Syst., 91-D (8): 2124-2133 (2008)Privacy Bargaining with Fairness: Privacy-Price Negotiation System for Applying Differential Privacy in Data Market Environments., and . IEEE BigData, page 1389-1394. IEEE, (2019)Collaborative caching techniques for privacy-preserving location-based services in peer-to-peer environments., and . IEEE BigData, page 4497-4506. IEEE Computer Society, (2017)An Efficient Detection of Conflicting Updates in Valid XML., , and . CIT, page 17-22. IEEE Computer Society, (2007)