Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network., , , , and . IEEE Trans. Veh. Technol., 71 (4): 4336-4347 (2022)A two-factor security authentication scheme for wireless sensor networks in IoT environments., , and . Neurocomputing, (2022)Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol., , , and . Int. J. Commun. Syst., 29 (3): 478-487 (2016)Real-world clinical data mining on TCM clinical diagnosis and treatment: A survey., , , , and . Healthcom, page 88-93. IEEE, (2012)Two Improved Multi-server Authentication Protocols Based on Hash Function and Smart Card., and . J. Networks, 5 (12): 1434-1441 (2010)From Rain Removal to Rain Generation., , , , and . CoRR, (2020)Low-light Image Enhancement by Retinex Based Algorithm Unrolling and Adjustment., , , , and . CoRR, (2022)Transcription elongation factors represent in vivo cancer dependencies in glioblastoma., , , , , , , , , and 14 other author(s). Nat., 547 (7663): 355-359 (2017)Screening and Identification of Key Biomarkers in Pancreatic Cancer: Evidence from Bioinformatic Analysis., , , , , , , , , and . J. Comput. Biol., 27 (7): 1079-1091 (2020)A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme., , , and . Wireless Personal Communications, 95 (3): 3391-3406 (2017)