Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity Management., and . IEEE Internet Comput., 11 (3): 82-85 (2007)Teaching RFID Information Systems Security., , and . IEEE Trans. Educ., 57 (1): 42-47 (2014)Fingerprinting RFID Tags., , and . IEEE Trans. Dependable Secur. Comput., 8 (6): 938-943 (2011)Feature selection for RFID tag identification., , , and . CHINACOM, page 218-221. IEEE, (2012)Using dummy data for RFID tag and reader authentication., , , and . Digit. Commun. Networks, 8 (5): 804-813 (2022)Load Balancing on a Grid Using Data Characteristics., and . GCA, page 184-190. CSREA Press, (2005)Sample-sort simulated annealing., and . IEEE Trans. Syst. Man Cybern. Part B, 35 (3): 625-632 (2005)Comparison of a genetic algorithm with a simulated annealing algorithm for the design of an ATM network., and . IEEE Communications Letters, 4 (8): 267-269 (2000)Analysis of Decoy Strategies for Detecting Ransomware., and . CNS, page 1-6. IEEE, (2023)Exploiting hidden Markov models in identifying passive UHF RFID tags., , and . RWS, page 259-261. IEEE, (2014)