Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

More on Shared-Scalar-Product Protocols., , , and . ISPEC, volume 3903 of Lecture Notes in Computer Science, page 142-152. Springer, (2006)Radio over WDM-PON by spatial multiplexing in few mode fiber., , , , , , , , , and . CSNDSP, page 1-5. IEEE, (2016)Model Self-Supervised Federated Learning for Heterogeneous Fingerprint Localization., , , and . IEEE Wirel. Commun. Lett., 13 (8): 2250-2254 (August 2024)Tracing Stateful Pirate Decoders., , and . ICC, page 1-5. IEEE, (2009)A Novel Location Privacy-Preserving Approach Based on Blockchain., , , and . Sensors, 20 (12): 3519 (2020)Digital Average Current-Mode Control of PWM DC-DC Converters Without Current Sensors., , and . IEEE Trans. Ind. Electron., 57 (5): 1670-1677 (2010)Uniform Models of PWM DC-DC Converters for Discontinuous Conduction Mode Considering Parasitics., , , and . IEEE Trans. Ind. Electron., 61 (11): 6071-6080 (2014)Critical Analysis of New Protocols on Lightweight Authentication., and . APCC, page 325-330. IEEE, (2018)Efficient Group Signatures from Bilinear Pairing., , , and . CISC, volume 3822 of Lecture Notes in Computer Science, page 128-139. Springer, (2005)A Lightweight Fast Handover Authentication Scheme in Mobile Networks., , , and . ICC, page 1-5. IEEE, (2009)