Author of the publication

A Study on the Security Vulnerabilities of Fuzzy Vault Based on Photoplethysmogram.

, , and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 359-365. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

All-or-Nothing Transform and Remotely Keyed Encription Protocols., , and . Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, page 178-195. Springer, (2000)An Image Steganography Using Pixel Characteristics., , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 581-588. Springer, (2005)DRM Cloud Architecture and Service Scenario for Content Protection., , and . J. Internet Serv. Inf. Secur., 3 (3/4): 94-105 (2013)Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage., , , and . Wirel. Commun. Mob. Comput., (2019)A Study on the Recovery Method of PPG Signal for IPI-Based Key Exchange., , , , and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 353-358. Springer, (2018)Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services., , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 437-443. Springer, (2015)Intelligent Access Control Mechanism for Ubiquitous Applications., and . ACIS-ICIS, page 955-960. IEEE Computer Society, (2007)Combined Scheme of Encryption and Watermarking in H.264/Scalable Video Coding (SVC)., and . New Directions in Intelligent Interactive Multimedia, volume 142 of Studies in Computational Intelligence, Springer, (2008)Certificate-Based Proxy Re-encryption for Public Cloud Storage., , , , and . IMIS, page 159-166. IEEE Computer Society, (2013)A New Fingerprinting Codes for Multimedia Contents., , , and . MMM (2), volume 4352 of Lecture Notes in Computer Science, page 510-519. Springer, (2007)