Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modulation recognition with GNU radio, keras, and HackRF., , and . DySPAN, page 1-3. IEEE, (2017)A Cryptanalysis of Stepk, m-Cascades., and . EUROCRYPT, volume 434 of Lecture Notes in Computer Science, page 680-687. Springer, (1989)Design issues of uplink media access control (MAC) protocols for multimedia traffic over DS-CDMA systems., , and . IEEE Trans. Multim., 7 (3): 551-562 (2005)Performance Analysis of an Integrated CS/PS Services CDMA System., , , , , and . IEEE Trans. Vehicular Technology, 54 (4): 1488-1499 (2005)Uplink performance analysis for an integrate PS/CS CDMA cellular system., , and . PIMRC, page 2696-2701. IEEE, (2003)Broad-band propagation channel analysis for DS and hybrid CDMA system design., , and . PIMRC, page 700-704. (1994)Clock-controlled shift registers: a review., and . IEEE J. Sel. Areas Commun., 7 (4): 525-533 (1989)Some remarks on an algorithm of Fitzpatrick., and . IEEE Trans. Inf. Theory, 42 (4): 1269-1271 (1996)Two Stream Ciphers.. FSE, volume 809 of Lecture Notes in Computer Science, page 51-55. Springer, (1993)On Random Mappings and Random Permutations.. FSE, volume 1008 of Lecture Notes in Computer Science, page 22-28. Springer, (1994)