Author of the publication

Realization of Integrated Service for Zoos Using RFID/USN Based Location Tracking Technology.

, , , and . UCMA (1), volume 150 of Communications in Computer and Information Science, page 361-368. (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Privacy Technique for Providing Anonymity to Sensor Nodes in a Sensor Network., , , , and . UCMA (1), volume 150 of Communications in Computer and Information Science, page 327-335. (2011)A Design of Secure Authentication Method with Bio-Information in the Car Sharing Environment., , and . CSA/CUTE, volume 421 of Lecture Notes in Electrical Engineering, page 205-210. Springer, (2016)RFID Mutual Authentication Protocols Using Key Exchange Based on Hash Functions., , , , and . FGIT-GDC, volume 261 of Communications in Computer and Information Science, page 246-255. Springer, (2011)VDTS: The Design of Real-Time Virus Detection and Tracing Systems., , , and . Security and Management, page 508-513. CSREA Press, (2003)PUF-Based Privacy Protection Method in VANET Environment., , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 263-268. Springer, (2015)Real-Time Monitoring System Using Location Based Service., , and . UCMA (1), volume 150 of Communications in Computer and Information Science, page 369-379. (2011)The Entrance Authentication and Tracking Systems Using Object Extraction and the RFID Tag., , and . UCMA (1), volume 150 of Communications in Computer and Information Science, page 313-326. (2011)User Authentication Method Design Based on Biometrics in a Multi-cloud Environment., , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 283-288. Springer, (2015)Design and Implementation of Multi Authentication Mechanism for Secure Electronic Commerce., , , and . SNPD, page 215-219. IEEE Computer Society, (2009)Security Protocol Design for Electronic-Cash Transactions in a Mobile-PKI Environment., and . ACIS-ICIS, page 887-891. IEEE Computer Society, (2010)