Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new proposal for a digital evidence container for security convergence., , and . ICCSCE, page 171-175. (2011)Secure mobile device structure for trust IoT., , , and . J. Supercomput., 74 (12): 6646-6664 (2018)A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange., , , , and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 353-358. Springer, (2018)A Methodology for Forensic Analysis of Embedded Systems., and . FGCN (2), page 283-286. IEEE Computer Society, (2008)978-0-7695-3431-2.On-the-spot digital investigation by means of LDFS: Live Data Forensic System., , , and . Math. Comput. Model., 55 (1-2): 223-240 (2012)An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment., , , and . Symmetry, 9 (8): 143 (2017)Development of Unidirectional Security Gateway Satisfying Security Functional Requirements., , and . MUE/FutureTech, volume 448 of Lecture Notes in Electrical Engineering, page 709-714. (2017)Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing., , , and . PDCAT, volume 931 of Communications in Computer and Information Science, page 84-89. Springer, (2018)A Stepwise Methodology for Tracing Computer Usage., , , , and . NCM, page 1852-1857. IEEE Computer Society, (2009)Methodologies for Detecting Covert Database., , , , , and . IIH-MSP, page 538-541. IEEE Computer Society, (2008)