Author of the publication

TR-AKA: A two-phased, registered authentication and key agreement protocol for 5G mobile networks.

, , and . IET Inf. Secur., 16 (3): 193-207 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Matching Confidence Constrained Bundle Adjustment for Multi-View High-Resolution Satellite Images., , , and . Remote Sensing, 12 (1): 20 (2020)Word Embedding With Zipf's Context., , , and . IEEE Access, (2019)Topic enhanced sentiment co-attention BERT., , , , and . J. Intell. Inf. Syst., 60 (1): 175-197 (February 2023)Cross-Domain WiFi Sensing with Channel State Information: A Survey., , and . ACM Comput. Surv., 55 (11): 231:1-231:37 (November 2023)Magneto: Joint Angle Analysis Using an Electromagnet-Based Sensing Method., , , and . IPSN, page 1-14. ACM, (2021)Light Auditor: Power Measurement Can Tell Private Data Leakage through IoT Covert Channels., , , , , and . SenSys, page 518-532. ACM, (2022)A bi-population based estimation of distribution algorithm for the flexible job-shop scheduling problem., , , , and . Comput. Ind. Eng., 62 (4): 917-926 (2012)Blow-up in nonlinear heat equations., , , and . Adv. Appl. Math., 40 (4): 433-481 (2008)LBVC: towards low-bandwidth video chat on smartphones., , , , and . MMSys, page 1-12. ACM, (2015)Hyperplane-based time-aware knowledge graph embedding for temporal knowledge graph completion., , , , and . J. Intell. Fuzzy Syst., 42 (6): 5457-5469 (2022)