Author of the publication

An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection.

, , , , and . Wireless Personal Communications, 96 (1): 1215-1228 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Edge Connection Optimization for JSCC System Based on DP-LDPC Codes., , , and . IEEE Wirel. Commun. Lett., 8 (4): 996-999 (2019)Adaptive Bit-Labeling Design for Probabilistic Shaping Based on Residual Source Redundancy., , , and . Entropy, 25 (4): 586 (April 2023)Mining Learning Behavioral Patterns of Students by Sequence Analysis in Cloud Classroom., , , , , and . Int. J. Distance Educ. Technol., 15 (1): 15-27 (2017)The impact of interactive whiteboards on education., , , and . ICIMCS, page 213-218. ACM, (2012)Design of Non-punctured Protograph LDPC Codes for JSCC Systems over Partial Response Channels., , , and . ICCC Workshops, page 292-297. IEEE, (2022)Investigation of the Technology Integration among Mathematics Teachers in a Key Senior High School., , , , and . ICALT, page 272-274. IEEE Computer Society, (2013)Understanding Reading Comprehension in Multi-display Presenting System: Visual Distribution and Cognitive Effect., and . HCI (30), volume 714 of Communications in Computer and Information Science, page 207-214. Springer, (2017)Applying Stylometric Analysis Techniques to Counter Anonymity in Cyberspace., , , and . J. Networks, 7 (2): 259-266 (2012)Improve the Security of Industrial Control System: A Fine-Grained Classification Method for DoS Attacks on Modbus/TCP., , , , , and . Mob. Networks Appl., 28 (2): 839-852 (April 2023)A Novel Random Subspace Method for Online Writeprint Identification., , , and . J. Comput., 7 (12): 2997-3004 (2012)