Author of the publication

Butterfly: Environment-Independent Physical-Layer Authentication for Passive RFID.

, , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (4): 166:1-166:21 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy enhanced access control in pervasive computing environments., and . BROADNETS, page 384-396. IEEE, (2005)The phases of large networks with edge and triangle constraints., , , and . CoRR, (2017)Privacy-Preserving Public Auditing for Secure Cloud Storage., , , , and . IACR Cryptology ePrint Archive, (2009)Security and Cloud Outsourcing Framework for Economic Dispatch., , , and . IEEE Trans. Smart Grid, 9 (6): 5810-5819 (2018)A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control., , and . IACR Cryptology ePrint Archive, (2009)Learning Saliency Maps for Adversarial Point-Cloud Generation., , , and . CoRR, (2018)PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones., , , , , and . IACR Cryptology ePrint Archive, (2013)Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing., , , , and . ESORICS, volume 5789 of Lecture Notes in Computer Science, page 355-370. Springer, (2009)Privacy-Preserving Public Auditing for Secure Cloud Storage., , , , and . IEEE Trans. Computers, 62 (2): 362-375 (2013)Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks., , , and . IEEE Trans. Vehicular Technology, 65 (10): 8331-8344 (2016)