Now 93 visitors
Today:558 Yesterday:495
Total: 27812 21S 15P 0R
2024-09-14, Week 37
TACT Journal Homepage
Conference Call for Paper
Author HomePage
Paper Procedure
Paper Submission
Registration Fare
Welcome Message
Statistics & History
Committee
Paper Archives
Outstanding Papers
Conference Proceedings
Presentation Assistant
Travel Information
Photo Gallery
FAQ
Member Login
Scheduler Login
Archives Login
Sponsors


















IEEE/ICACT20220353 Question.6
Questioner: namacabale@gmail.com    2022-02-15 ¿ÀÈÄ 4:50:15
IEEE/ICACT20220353 Answer.6
Answer by Auhor jongjcho@korea.ac.kr   2022-02-15 ¿ÀÈÄ 4:50:15
Dear Author, you have a very good research. Is there an existing technology almost similar to your proposal that has been deployed in real world environment? What does it lack that your work specifically addressed? Thank you and stay safe. Hello. this technique is developed by Microsoft. therefore, you have to realize that all the products developed by Microsoft used this technique. In my honest opinion, it is one of the important secure by design process, however, not many companies are able to do this technique.

Select Voice