Author of the publication

A RFID Mutual Authentication Security Protocol Design and Analysis.

, , , , , and . 3PGCIC, page 508-512. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of Multi-channel Burst Frame Detector.. MLICOM (2), volume 227 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 595-602. Springer, (2017)Bilingual Recurrent Neural Networks for improved statistical machine translation., and . SLT, page 66-70. IEEE, (2014)Research on adaptive CNC machining arithmetic and process for near-net-shaped jet engine blade., , , , and . J. Intell. Manuf., 31 (3): 717-744 (2020)Coupling between heparan sulfate proteoglycans and FGF-2 receptors is key to FGF-2 capture under flow: a computational study., , , , and . BCB, page 439-441. ACM, (2010)Performance Analysis and Power Allocation for NOMA-Based Hybrid Satellite-Terrestrial Relay Networks With Imperfect Channel State Information., , , and . IEEE Access, (2019)Multi-Controller Placement for Load Balancing in SDWAN., , , and . IEEE Access, (2019)A Distributed Collaborative Game-Theoretic Approach in Cognitive Satellite Communication Networks., , , , and . IEEE Access, (2020)Modified gradient sampling algorithm for nonsmooth semi-infinite programming., , , and . J. Appl. Math. Comput., 69 (6): 4425-4450 (December 2023)YUAN 2.0: A Large Language Model with Localized Filtering-based Attention., , , , , , , , , and 2 other author(s). CoRR, (2023)Performance analysis and optimization of a cold standby system subject to δ-shocks and imperfect repairs., , , , and . Reliab. Eng. Syst. Saf., (2021)