Author of the publication

Impersonation attack on CertificateLess key agreement protocol.

, , and . Int. J. Ad Hoc Ubiquitous Comput., 27 (2): 108-120 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Range Normal Bisector Localization Algorithm for Wireless Sensor Networks., and . Wirel. Pers. Commun., 97 (3): 4529-4549 (2017)Design of NIRS Probe Based on Computational Model to Find Out the Optimal Location for Non-Invasive Brain Stimulation., and . J. Medical Syst., 42 (12): 244:1-244:15 (2018)An Audio Watermark Designed for Efficient and Robust Resynchronization After Analog Playback., and . IEEE Trans. Inf. Forensics Secur., 12 (6): 1393-1405 (2017)Insertion, Deletion Codes With Feature-Based Embedding: A New Paradigm for Watermark Synchronization With Applications to Speech Watermarking., and . IEEE Trans. Inf. Forensics Secur., 3 (2): 153-165 (2008)Combining Feature Correspondence With Parametric Chamfer Alignment: Hybrid Two-Stage Registration for Ultra-Widefield Retinal Images., , , , , and . IEEE Trans. Biomed. Eng., 70 (2): 523-532 (February 2023)Improved Low-Density Parity Check Accumulate (LDPCA) Codes., and . IEEE Trans. Commun., 61 (9): 3590-3599 (2013)Audiovisual Analysis of Music Performances: Overview of an Emerging Field., , , , and . IEEE Signal Process. Mag., 36 (1): 63-73 (2019)Digital Color Imaging Handbook. Boca Raton, FL, USA, (2002)Delay and capacity trade-offs in mobile ad hoc networks: a global perspective., , and . IEEE/ACM Trans. Netw., 15 (5): 981-992 (2007)Reliable Resource Selection in Grid Environment, and . CoRR, (2012)