Author of the publication

Design of three-factor secure and efficient authentication and key-sharing protocol for IoT devices.

, , , , and . Comput. Commun., (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Jittor: a novel deep learning framework with meta-operators and unified graph execution., , , , and . Sci. China Inf. Sci., (2020)Input-output finite-time stability of discrete-time systems under finite-time boundedness., , , , and . Int. J. Systems Science, 50 (2): 419-431 (2019)Quality of Service Guarantee for Temporal Consistency of Real-Time Transactions., , , and . IEEE Trans. Knowl. Data Eng., 18 (8): 1097-1110 (2006)Practical Analysis of Key Recovery Attack Against Search-LWE Problem., , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 164-181. Springer, (2016)Low-Rank Tucker Approximation of a Tensor From Streaming Data., , , , and . CoRR, (2019)Virtual Force Coverage Control System of Wireless Sensor Network in the Background of Big Data., and . ICMTEL, volume 326 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 472-487. Springer, (2020)A Mode 5 signal detection method based on phase and amplitude correlation., , and . ICNC, page 1219-1223. IEEE, (2013)A novel complex network-based modeling method for heterogeneous product design., , , and . Clust. Comput., 22 (Supplement): 7861-7872 (2019)Priority-Based PCIe Scheduling for Multi-Tenant Multi-GPU Systems., , , , , , , , , and . IEEE Comput. Archit. Lett., 18 (2): 157-160 (2019)Towards Adversarial Robustness via Transductive Learning., , , , , , and . CoRR, (2021)