Author of the publication

Trusted access in wireless network on mutual interactive authentication mechanism.

, , , and . ChinaCom, page 776-781. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One for All, All for One: A Unified Evaluation Framework for Univariate DPA Attacks., , , , , and . IACR Cryptol. ePrint Arch., (2022)CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks., , , , , and . IACR Cryptol. ePrint Arch., (2021)How to Launch a Powerful Side-Channel Collision Attack?, , , , , and . IACR Cryptol. ePrint Arch., (2022)Profiling Good Leakage Models For Masked Implementations., , , and . IACR Cryptol. ePrint Arch., (2017)Manifold Learning Side-Channel Attacks against Masked Cryptographic Implementations., , , , and . IACR Cryptol. ePrint Arch., (2023)Double-Key Recovery Based Correlation Power Analysis., , , , and . Trustcom/BigDataSE/ISPA, page 1016-1022. IEEE, (2016)A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks., , , , and . IEEE Trans. Computers, 69 (11): 1694-1706 (2020)Pedestrian Heading Estimation Based on Spatial Transformer Networks and Hierarchical LSTM., , , , , , and . IEEE Access, (2019)POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis., , , , , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 598-601. Springer, (2015)Uncertain? No, It's Very Certain! - Recovering the Key from Guessing Entropy Enhanced CPA., , , , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 308-320. Springer, (2016)