Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forward-link authentication for RFIDs., and . PIMRC, page 2644-2649. IEEE, (2010)Backward Link Authentication For RFID tags., , and . RFID-TA, page 348-352. IEEE, (2011)New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version)., and . IACR Cryptology ePrint Archive, (2008)Cross-Scenario Performance Modelling for Big Data Ecosystems., and . HCI (37), volume 12217 of Lecture Notes in Computer Science, page 211-228. Springer, (2020)Incorporating service and user information and latent features to predict QoS for selecting and recommending cloud service compositions., , , and . Clust. Comput., 19 (3): 1227-1242 (2016)A new image encryption algorithm based on a chaotic DNA substitution method., and . ICC, page 1011-1015. IEEE, (2012)A Sybil Resistant IoT Trust Model Using Blockchains., and . iThings/GreenCom/CPSCom/SmartData, page 1017-1026. IEEE, (2018)DiSEL: a distance based slot selection protocol for framed slotted ALOHA RFID systems., and . WCNC, page 1497-1502. IEEE, (2009)Privacy Preserving k-Means Clustering in Multi-Party Environment., , and . SECRYPT, page 381-385. INSTICC Press, (2007)Unitary Space-Time Group Codes: Diversity Sums From Character Tables., , and . IEEE Trans. Inf. Theory, 54 (11): 5203-5210 (2008)