Author of the publication

Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV.

, , , , and . Peer-to-Peer Netw. Appl., 11 (4): 723-734 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CHASSIS: Conformity Meets Online Information Diffusion., , and . SIGMOD Conference, page 1829-1840. ACM, (2020)BRUNCH: Branching Structure Inference of Hybrid Multivariate Hawkes Processes with Application to Social Media., , and . PAKDD (1), volume 12084 of Lecture Notes in Computer Science, page 553-566. Springer, (2020)Discovering Aging-Genes by Topological Features in Drosophila melanogaster Protein-Protein Interaction Network., , , , and . ICDM Workshops, page 94-98. IEEE Computer Society, (2012)Semi-supervised imputation for microarray missing value estimation., , and . BIBM, page 297-300. IEEE Computer Society, (2014)Quantum Strategy Without Entanglement, , , , , and . (November 2000)Value Evaluation and Analysis of Space Characteristics on Linear Cultural Heritage Corridor Ancient Puer Tea Horse Road., , , , and . GRMSE, volume 569 of Communications in Computer and Information Science, page 733-740. Springer, (2015)The Formation of the First Quasars in the Universe, , , and . (2017)cite arxiv:1703.00449Comment: 6 pages, 5 figures. Submitted to ApJ.Fine-Grained Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks., , and . INCoS, page 374-378. IEEE, (2015)Analog behavioral modeling flow using statistical learning method., , , and . ISQED, page 872-878. IEEE, (2010)A DCT And SVD based Watermarking Technique To Identify Tag., , , , and . CoRR, (2015)