Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pocket EZPIN device for healthcare IC cards to enhance the security and convenience of senior citizens., and . Comput. Biol. Medicine, 38 (4): 411-415 (2008)A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations., , and . Comput. Stand. Interfaces, 32 (5-6): 274-280 (2010)DRASE: A Dynamic Rescheduling and Self-Adaptive Estimation Technique to Enhance ACS Throughputs in CWMP., , and . IEEE Communications Letters, 20 (11): 2161-2164 (2016)Dual Function Seal: Visualized Digital Signature for Electronic Medical Record Systems., , and . J. Medical Systems, 36 (5): 3115-3121 (2012)A simple single-switch single-stage AC/DC converter with harmonic current correction., , and . IEICE Electron. Express, 6 (24): 1757-1763 (2009)A Portable Feather-Weight Java-Based Graphic Library for Embedded Systems on Java Processor., , , , , and . IIH-MSP, page 998-1001. IEEE Computer Society, (2009)A Single-Trace Cycle Collection for Reference Counting Systems., , and . ISPAN, page 40-45. IEEE Computer Society, (2009)A Quick XML Parser for Extracting Signatures of Secure Web Services., , , , , and . CIT, page 1093-1098. IEEE Computer Society, (2005)A Snapshot-Based Evaluation Method for Garbage Collection., , and . IIH-MSP, page 418-421. IEEE Computer Society, (2010)Two Control Computation Transformation Methods for Obfuscating Java Soft Software., and . Web Technologies, Applications, and Services, page 48-52. IASTED/ACTA Press, (2005)