Author of the publication

IPTV Micropayment System Based on Hash Chain Using RFID-USB Module.

, , and . COMPSAC, page 155-160. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Integrated Benchmark Suite for Database Systems., and . ISDB, page 74-79. Acta Press, (2002)Non-Uniform Spectral Compression with the Formant-Emphasized Filterbank for Noisy Speech Recognition., , , and . IPCV, page 570-573. CSREA Press, (2007)Oligopolistic incentives for pollution control with nonzero conjectures, and . Economics Letters, 49 (1): 95--99 (July 1995)Identity-Based Key Issuing Without Secure Channel in a Broad Area., and . WISA, volume 4298 of Lecture Notes in Computer Science, page 30-44. Springer, (2006)Integration Analysis of Diverse Genomic Data Using Multi-clustering Results., , , and . ISBMDA, volume 4345 of Lecture Notes in Computer Science, page 37-48. Springer, (2006)A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN., , , and . J. Digit. Content Technol. its Appl., 2 (1): 61-66 (2008)Efficient Unilateral Authentication Mechanism for MIPv6., , , and . International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 908-911. Springer, (2006)An Efficient Device Authentication Protocol Using Bioinformatic., , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 567-575. Springer, (2006)Comparative Performance of State-of-the-Art Classifiers in Computer-Aided Detection for CT Colonography., , and . Abdominal Imaging, volume 7601 of Lecture Notes in Computer Science, page 78-87. Springer, (2012)An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme., and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 93-104. Springer, (2007)