Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks., , and . IJDSN, (2013)Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption., , , and . IACR Cryptology ePrint Archive, (2007)Reliable and Secure Voice Encryption over GSM Voice Channel., , and . J. Inform. and Commun. Convergence Engineering, 8 (1): 64-70 (2010)Mutual Authentication and Secure Session Termination Scheme in iATA Protocol., , , and . J. Inform. and Commun. Convergence Engineering, 8 (4): 437-442 (2010)Data Link Layer' Security Analysis for Wireless Sensor Networks., , and . FGIT-FGCN/DCA, volume 350 of Communications in Computer and Information Science, page 25-32. Springer, (2012)An effective framework of behavior detection-advanced static analysis for malware detection., , , and . ISCIT, page 361-365. IEEE, (2014)A 16-GB 640-GB/s HBM2E DRAM With a Data-Bus Window Extension Technique and a Synergetic On-Die ECC Scheme., , , , , , , , , and 16 other author(s). IEEE J. Solid State Circuits, 56 (1): 199-211 (2021)An In-DRAM BIST for 16 Gb DDR4 DRAM in the 2nd 10-nm-Class DRAM Process., , , , , and . IEEE Access, (2021)Design of a Parallel-Type Gripper Mechanism., , , , , , and . Int. J. Robotics Res., 21 (7): 661-678 (2002)Security Analysis and Improvements of Authentication and Access Control in the Internet of Things., , and . Sensors, 14 (8): 14786-14805 (2014)