Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed., , , , , , , , , and 11 other author(s). IEEE Journal on Selected Areas in Communications, 24 (10): 1889-1900 (2006)Risk Management of Corporate Confidential Information in Digital Form., , , , , , and . COMPSAC, page 88-89. IEEE Computer Society, (2004)Security of Tseng-Jan's group signature schemes., , , , , and . Inf. Process. Lett., 75 (5): 187-189 (2000)Characterization of 3-Regular Halin Graphs with Edge-face Total Chromatic Number Equal to Four., , and . Ars Comb., (2014)Delegation of signing and decryption rights using pki proxy memo., , , , , , , and . IASTED Conf. on Software Engineering, page 281-285. IASTED/ACTA Press, (2004)A Study on Movement Compatibility for Lever Control and Circular Display with Computer Simulated Test., and . IMECS, page 625-629. Newswood Limited, (2006)Hardware Test on Movement Compatibility for Rotary Control and Digital Display., and . IMECS, page 721-725. Newswood Limited, (2006)Visualizing input and output analysis for simulation (VINOAS)., and . Simul. Pr. Theory, 5 (5): 425-453 (1997)Enhanced Distance-Based Location Management of Mobile Communication Systems Using a Cell Coordinates Approach., and . IEEE Trans. Mob. Comput., 4 (1): 41-55 (2005)An Overview of Population Stereotypes for Common Control-display Configurations in Human-Machine Interface., and . IMECS, page 2251-2256. Newswood Limited, (2007)