Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity Management., and . IEEE Internet Comput., 11 (3): 82-85 (2007)Using dummy data for RFID tag and reader authentication., , , and . Digit. Commun. Networks, 8 (5): 804-813 (2022)Fingerprinting RFID Tags., , and . IEEE Trans. Dependable Secur. Comput., 8 (6): 938-943 (2011)Teaching RFID Information Systems Security., , and . IEEE Trans. Educ., 57 (1): 42-47 (2014)Feature selection for RFID tag identification., , , and . CHINACOM, page 218-221. IEEE, (2012)Load Balancing on a Grid Using Data Characteristics., and . GCA, page 184-190. CSREA Press, (2005)Sample-sort simulated annealing., and . IEEE Trans. Syst. Man Cybern. Part B, 35 (3): 625-632 (2005)Comparison of a genetic algorithm with a simulated annealing algorithm for the design of an ATM network., and . IEEE Communications Letters, 4 (8): 267-269 (2000)Analysis of Decoy Strategies for Detecting Ransomware., and . CNS, page 1-6. IEEE, (2023)Exploiting hidden Markov models in identifying passive UHF RFID tags., , and . RWS, page 259-261. IEEE, (2014)