Author of the publication

Fingerprint-based access control using smart cards in IPTV.

, , , , and . Multimedia Tools Appl., 73 (2): 647-661 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fully collusion-resistant trace-and-revoke scheme in prime-order groups., , and . Journal of Communications and Networks, 13 (5): 428-441 (2011)Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption., , , , and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 16-34. Springer, (2002)Unsupervised learning network based on gradient descent procedure of fuzzy objective function., and . ICNN, page 1427-1432. IEEE, (1996)Secure searchable public key encryption scheme against keyword guessing attacks., , and . IEICE Electronic Express, 6 (5): 237-243 (2009)Fingerprint-based access control using smart cards in IPTV., , , , and . Multimedia Tools Appl., 73 (2): 647-661 (2014)A Design and Analysis of Objective Function-Based Unsupervised Neural Networks for Fuzzy Clustering., and . Neural Processing Letters, 4 (2): 83-95 (1996)Oblivious Conjunctive Keyword Search., , , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 318-327. Springer, (2005)Trapdoor security in a searchable public-key encryption scheme with a designated tester., , , and . Journal of Systems and Software, 83 (5): 763-771 (2010)Keyword Updatable PEKS., and . WISA, volume 9503 of Lecture Notes in Computer Science, page 96-109. Springer, (2015)Improved searchable public key encryption with designated tester., , , and . AsiaCCS, page 376-379. ACM, (2009)