Author of the publication

Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol.

, , and . EEE, page 565-568. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Mining of Association Rules with Item Constraints.. Discovery Science, volume 1532 of Lecture Notes in Computer Science, page 423-424. Springer, (1998)Efficient mining of categorized association rules in large databases.. SMC, page 3606-3610. IEEE, (2000)Mining multilevel and location-aware service patterns in mobile web environments., and . IEEE Trans. Syst. Man Cybern. Part B, 34 (6): 2480-2485 (2004)Deep Discriminative Features Learning and Sampling for Imbalanced Data Problem., , and . ICDM, page 1146-1151. IEEE Computer Society, (2018)Scheduling value-based transactions in distributed real-time database systems., , and . IPDPS, page 94. IEEE Computer Society, (2001)Dynamic Multiprocessor Scheduling for Supporting Real-Time Constraints., , and . ASIAN, volume 1345 of Lecture Notes in Computer Science, page 83-97. Springer, (1997)Integrated Business Agents for Processing Free Text Information., , and . J. Inf. Sci. Eng., 20 (2): 325-347 (2004)Scheduling Value-Based Transactions in Real-Time Main-Memory Databases., , and . RTDB, page 111-117. (1996)An Efficient Approach for Partial-Sum Queries in Data Cubes Using Hamming-Based Codes., , and . DASFAA, volume 2973 of Lecture Notes in Computer Science, page 457-468. Springer, (2004)An Efficient Method for Mining Associated Service Patterns in Mobile Web Environments., and . SAC, page 455-459. ACM, (2003)