Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User., , , and . Secur. Commun. Networks, (2017)An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps., , , and . J. Medical Systems, 40 (3): 70:1-70:11 (2016)API-Based Software Birthmarking Method Using Fuzzy Hashing., , , , and . IEICE Trans. Inf. Syst., 99-D (7): 1836-1851 (2016)Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks., , , , and . Sensors, 14 (4): 6443-6462 (2014)An enhanced unlinkable anonymous payment scheme based on near field commnication., , , , and . IMCOM, page 38. ACM, (2017)Deep reinforcement learning-designed radiofrequency waveform in MRI., , , , , , and . Nat. Mach. Intell., 3 (11): 985-994 (2021)Substructure-Atom Cross Attention for Molecular Representation Learning., , , , and . CoRR, (2022)DeepRF: Deep Reinforcement Learning Designed RadioFrequency Waveform in MRI., , , , , , and . CoRR, (2021)Security Improvement of Portable Key Management Using a Mobile Phone., , , , and . ICCSA (4), volume 9158 of Lecture Notes in Computer Science, page 148-159. Springer, (2015)Mingle: Wearable Devices for Enhancing Communications and Activities between the Blind and Ordinary People through a Waltz., and . CHI Extended Abstracts, page 367-370. ACM, (2015)