Author of the publication

New Anti-phishing Method with Two Types of Passwords in OpenID System.

, , , , and . ICGEC, page 69-72. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Factories and Dynamic Core Competency: a Case Study of Advanced semiconductor Engineering.. PACIS, page 251. AISeL, (2008)Applying Statistical Modeling to Predict Basketball Winning Percentage., , , and . FSDM, volume 309 of Frontiers in Artificial Intelligence and Applications, page 44-52. IOS Press, (2018)Ajax live regions: chat as a case example., and . W4A, volume 225 of ACM International Conference Proceeding Series, page 7-14. ACM, (2007)Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications., , , , , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 62-81. Springer, (2012)A real-world online signature verification system based on correlation algorithm., , and . Int. J. Comput. Appl. Technol., 58 (4): 321-339 (2018)New Anti-phishing Method with Two Types of Passwords in OpenID System., , , , and . ICGEC, page 69-72. IEEE Computer Society, (2011)Constrained Language Models Yield Few-Shot Semantic Parsers., , , , , , , , , and . EMNLP (1), page 7699-7715. Association for Computational Linguistics, (2021)Wireless synchronization of mm-wave arrays in 65nm CMOS., and . CICC, page 1-4. IEEE, (2015)Figure Captioning with Relation Maps for Reasoning., , , , , and . WACV, page 1526-1534. IEEE, (2020)From Physician Queries to Logical Forms for Efficient Exploration of Patient Data., , , and . ICSC, page 371-374. IEEE, (2019)