Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Control Computation Transformation Methods for Obfuscating Java Soft Software., and . Web Technologies, Applications, and Services, page 48-52. IASTED/ACTA Press, (2005)Hierarchical Key Management of Scalable Video Coding., , and . IIH-MSP, page 399-402. IEEE Computer Society, (2007)Multicast Deployment of Cloud Operating Systems., , , , , and . CIT, page 163-168. IEEE Computer Society, (2012)Personalized iDTV Program in Multimedia Home Platform., , , and . AINA Workshops, page 473-476. IEEE Computer Society, (2008)Dual Function Seal: Visualized Digital Signature for Electronic Medical Record Systems., , and . J. Medical Systems, 36 (5): 3115-3121 (2012)A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations., , and . Comput. Stand. Interfaces, 32 (5-6): 274-280 (2010)Pocket EZPIN device for healthcare IC cards to enhance the security and convenience of senior citizens., and . Comput. Biol. Medicine, 38 (4): 411-415 (2008)A simple single-switch single-stage AC/DC converter with harmonic current correction., , and . IEICE Electron. Express, 6 (24): 1757-1763 (2009)DRASE: A Dynamic Rescheduling and Self-Adaptive Estimation Technique to Enhance ACS Throughputs in CWMP., , and . IEEE Communications Letters, 20 (11): 2161-2164 (2016)A Snapshot-Based Evaluation Method for Garbage Collection., , and . IIH-MSP, page 418-421. IEEE Computer Society, (2010)