Author of the publication

Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication.

, , and . AINA Workshops, page 278-282. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks., , and . IJDSN, (2013)Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption., , , and . IACR Cryptology ePrint Archive, (2007)Reliable and Secure Voice Encryption over GSM Voice Channel., , and . J. Inform. and Commun. Convergence Engineering, 8 (1): 64-70 (2010)Mutual Authentication and Secure Session Termination Scheme in iATA Protocol., , , and . J. Inform. and Commun. Convergence Engineering, 8 (4): 437-442 (2010)Data Link Layer' Security Analysis for Wireless Sensor Networks., , and . FGIT-FGCN/DCA, volume 350 of Communications in Computer and Information Science, page 25-32. Springer, (2012)An effective framework of behavior detection-advanced static analysis for malware detection., , , and . ISCIT, page 361-365. IEEE, (2014)Security Analysis and Improvements of Authentication and Access Control in the Internet of Things., , and . Sensors, 14 (8): 14786-14805 (2014)Implementation of an embedded omni-directional mobile robot with active caster wheels., , , , and . IROS, page 3911-3918. IEEE, (2007)People tracking method for a mobile robot with laser scanner and omni directional camera., , , , and . URAI, page 503-507. IEEE, (2011)Navigation of an omni-directional mobile robot with active caster wheels., , , , , and . ICRA, page 1659-1665. IEEE, (2008)