Author of the publication

Mobile RFID Mutual Authentication Protocol Based on Hash Function.

, and . CyberC, page 358-361. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and Application of Access Control Technology., and . ICCCS (5), volume 11067 of Lecture Notes in Computer Science, page 584-593. Springer, (2018)Tobacco Industry Data Security Protection System., , , , and . ICCCS, page 1-5. IEEE, (2019)Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis., , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 623-636. Springer, (2019)Tobacco System Industrial Control System Security., , and . ICCCS, page 693-696. IEEE, (2019)Design and Practice of Industrial Control Network Security Threat Model., , and . ICISCAE (ACM), page 2106-2109. ACM, (2021)Research on Automatic Identification of Information Assets Based on Industrial Control Network Traffic., , and . ICISCAE (ACM), page 2119-2122. ACM, (2021)Mobile RFID Mutual Authentication Protocol Based on Hash Function., and . CyberC, page 358-361. IEEE, (2017)Security Threat and Protection in Industrial Control System., and . ICCCS (6), volume 11068 of Lecture Notes in Computer Science, page 49-58. Springer, (2018)S3IM: Stochastic Structural SIMilarity and Its Unreasonable Effectiveness for Neural Fields., , , , , , , and . ICCV, page 17978-17988. IEEE, (2023)