Author of the publication

Securing Mobile Location-based Services through position verification leveraging key distribution.

, , , , , and . WCNC, page 2694-2699. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Autonomous Visual Navigation Guided by Path Boundaries for Mobile Robot., , and . CSSE (6), page 344-348. IEEE Computer Society, (2008)978-0-7695-3336-0.Trabecular texture analysis in dental CBCT by multi-ROI multi-feature fusion., , , , , , , and . ISBI, page 846-849. IEEE, (2014)Towards the Application of a Handwriting Interface for Mathematics Learning., , and . ICME, page 2077-2080. IEEE Computer Society, (2006)Learning feature transforms for object detection from panoramic images., , and . ICME, page 643-648. IEEE Computer Society, (2010)Architecture design of the workflow execution system containing Humanware Services., , , , and . ICNSC, page 54-57. IEEE, (2014)An overcomplete pyramid representation for improved gsm image denoising., , , and . ICME, page 1-6. IEEE Computer Society, (2011)Multi-task Assignment in Information Technology Companies Based on the E-CARGO Model., , , , , and . SMC, page 310-315. IEEE, (2015)An effective document image deblurring algorithm., , , and . CVPR, page 369-376. IEEE Computer Society, (2011)A Robust Anti-collusion Coding in Digital Fingerprinting System., and . APCCAS, page 996-999. IEEE, (2006)Implementation of Multipoint Video Conference in Software., and . APCCAS, page 1980-1983. IEEE, (2006)