Author of the publication

Encryption algorithms comparisons for wireless networked sensors.

, , , and . SMC (2), page 1142-1146. IEEE, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Kinds of Rough Algebras and Brouwer-Zadeh Lattices., , , and . RSCTC, volume 4259 of Lecture Notes in Computer Science, page 99-106. Springer, (2006)Enhanced Turbulent Mixing in the Upper Ocean Induced by Super Typhoon Goni (2015)., , , , and . Remote. Sens., 14 (10): 2300 (2022)Image-Based Virtual Navigation System for Art Caves., and . Int. J. Virtual Real., 4 (4): 83-96 (2000)Rough Sets and Brouwer-Zadeh Lattices., , and . RSKT, volume 4062 of Lecture Notes in Computer Science, page 200-207. Springer, (2006)Popular Music Retrieval by Independent Component Analysis., , and . ISMIR, (2002)Ellipse-based shape description and retrieval method., and . Sci. China Ser. F Inf. Sci., 45 (4): 299-309 (2002)Automatic Generation of Artistic Chinese Calligraphy., , , and . AAAI, page 937-943. AAAI Press / The MIT Press, (2004)Hierarchical Infrastructure for Large-Scale Distributed Privacy-Preserving Data Mining., , , and . International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 1020-1023. Springer, (2005)A knowledge-guided and traditional Chinese medicine informed approach for herb recommendation., , , , , and . Frontiers Inf. Technol. Electron. Eng., 24 (10): 1416-1429 (October 2023)Special issue on artificial intelligence 2.0.. Frontiers Inf. Technol. Electron. Eng., 18 (1): 1-2 (2017)