Author of the publication

A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols.

, , , and . ICDCIT, volume 4882 of Lecture Notes in Computer Science, page 327-335. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic information system: A lightweight geocast-based piggybacking strategy for cooperative awareness in VANET., , , , and . ICCE, page 614-615. IEEE, (2013)Key management scheme using secret sharing for multi-device based DRM., , , , , and . ICCE, page 384-385. IEEE, (2012)Pose-Invariant Face Detection Using Edge-Like Blob Map and Fuzzy Logic., , , , and . IEA/AIE, volume 3533 of Lecture Notes in Computer Science, page 695-704. Springer, (2005)MetaVRain: A Mobile Neural 3-D Rendering Processor With Bundle-Frame-Familiarity-Based NeRF Acceleration and Hybrid DNN Computing., , , , , and . IEEE J. Solid State Circuits, 59 (1): 65-78 (January 2024)Encoding Speaker-Specific Latent Speech Feature for Speech Synthesis., , , , , , , and . CoRR, (2023)Vehicle Witnesses as a Service: Leveraging Vehicles as Witnesses on the Road in VANET Clouds., , , , , and . CloudCom (1), page 439-444. IEEE Computer Society, (2013)Speaker Adaptation of Various Components in Deep Neural Network based Speech Synthesis., , and . SSW, page 153-159. ISCA, (2016)A 54.7 fps 3D Point Cloud Semantic Segmentation Processor with Sparse Grouping Based Dilated Graph Convolutional Network for Mobile Devices., , , and . ISCAS, page 1-5. IEEE, (2020)A 161.6 TOPS/W Mixed-mode Computing-in-Memory Processor for Energy-Efficient Mixed-Precision Deep Neural Networks., , , , , and . ISCAS, page 365-369. IEEE, (2022)Ticket-Based Binding Update Protocol for Mobile IPv6., , and . ICDCIT, volume 4317 of Lecture Notes in Computer Science, page 63-72. Springer, (2006)