Author of the publication

A semantic DRM contents in social-awareness using ontology.

, , , , , , , and . ICHIT, volume 321 of ACM International Conference Proceeding Series, page 508-511. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study for Security Scheme and the Right to Be Forgotten Based on Social Network Service for Smart-Phone Environment., , , and . ISA, volume 200 of Communications in Computer and Information Science, page 326-332. Springer, (2011)A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control)., , , , , , , and . ISA, volume 200 of Communications in Computer and Information Science, page 378-383. Springer, (2011)A semantic DRM contents in social-awareness using ontology., , , , , , , and . ICHIT, volume 321 of ACM International Conference Proceeding Series, page 508-511. ACM, (2009)An Adaptive System Supporting Collaborative Learning Based on a Location-Based Social Network and Semantic User Modeling., and . IJDSN, (2012)A study for semantics participation platform architecture using RDF/OWL., , , , , , , and . ICHIT, volume 321 of ACM International Conference Proceeding Series, page 512-515. ACM, (2009)The Study for Next Mobile UX Based on Touch Technology., and . ICHIT (2), volume 310 of Communications in Computer and Information Science, page 707-712. Springer, (2012)A Social Education Network Based on Location Sensing Information Using Smart-Phones., and . ACN, volume 199 of Communications in Computer and Information Science, page 42-48. Springer, (2011)A Study on Privacy-Related Considerations in Ubiquitous Computing Environment., , , and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 460-463. Springer, (2005)A Political Communication Scheme of Citizen Network System on Disembedding and Embedding Principle., and . FGIT-FGCN (2), volume 266 of Communications in Computer and Information Science, page 34-42. Springer, (2011)A Study for Method of Construct Encryption Scheme for Supporting Range Query Based on Bucket ID Transformation about Sensor Applications., , and . ISA, volume 200 of Communications in Computer and Information Science, page 292-305. Springer, (2011)