Author of the publication

S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol.

, , , , , , and . IEEE Internet of Things Journal, 4 (1): 88-100 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Distributed Framework for Worm Detection & Throttling in Mobile Peer-to-Peer Networks., , , , and . JDCTA, 3 (2): 120-126 (2009)Distributing the Keys into P2P Network., , and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 460-463. Springer, (2003)A Resource Allocation Algorithm in Cognitive Radio Networks Based on Cooperative Game Theory Approach., , and . JDCTA, 4 (5): 112-117 (2010)RUN: Residual U-Net for Computer-Aided Detection of Pulmonary Nodules without Candidate Selection., , , , and . CoRR, (2018)Synthetic Aperture Radar Automatic Target Recognition Based on a Simple Attention Mechanism., , , , , , , and . Int. J. Interact. Multim. Artif. Intell., 8 (4): 67 (2023)Channel Precoding Based Message Authentication in Wireless Networks: Challenges and Solutions., , , , , and . IEEE Netw., 33 (1): 99-105 (2018)Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT., , and . Secur. Commun. Networks, (2021)Traditional and Hybrid Access Control Models: A Detailed Survey., , , , , , , and . Secur. Commun. Networks, (2022)A Service Recommendation Algorithm Based on Modeling of Dynamic and Diverse Demands., , and . Int. J. Web Serv. Res., 15 (1): 47-70 (2018)Cryptanalysis of an Identity Based Signcryption without Random Oracles., , and . Fundam. Informaticae, 107 (1): 105-109 (2011)