Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Persona-based application personalization, , and . (2006)Spatial-Temporal Convolutional LSTMs for Tumor Growth Prediction by Learning 4D Longitudinal Patient Data., , , , , and . CoRR, (2019)Spatio-Temporal Convolutional LSTMs for Tumor Growth Prediction by Learning 4D Longitudinal Patient Data., , , , , , and . IEEE Trans. Medical Imaging, 39 (4): 1114-1126 (2020)Tracking diaphragm and chest wall movement on cine-MRI., , , , , , , , , and . ISBI, page 1301-1304. IEEE, (2018)Cryptanalysis of a suite of deniable authentication protocols., , and . IEEE Communications Letters, 10 (6): 504-506 (2006)Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange., , and . IACR Cryptology ePrint Archive, (2005)Improved Efficient Remote User Authentication Schemes., , and . Int. J. Netw. Secur., 4 (2): 149-154 (2007)Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms., , , and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 389-409. Springer, (2005)Analysis and improvement of an authenticated key exchange protocol for sensor networks., , and . IEEE Communications Letters, 9 (11): 970-972 (2005)An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices., , and . Theor. Comput. Sci., 378 (2): 198-207 (2007)