Author of the publication

A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem.

, , , , and . IEEE Internet Things J., 6 (6): 10251-10260 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The interactions of localized coherent structures for a (2?+?1)-dimensional system, , and . Chaos, Solitons & Fractals, 34 (3): 919--931 (November 2007)Simulation and Analysis of Rumor Propagation Model Based on Multi-Agent., , and . CSSE, page 139-144. ACM, (2020)Design of Automatic Fast Food Vending Machine Based on SIMATIC LOGO!, , , , and . ICITEE, page 147:1-147:5. ACM, (2019)A Multi-Angle Hierarchical Differential Evolution Approach for Multimodal Optimization Problems., , , , and . IEEE Access, (2020)Submesoscale Short-Lived Eddies in the Southwestern Taiwan Strait Observed by High-Frequency Surface-Wave Radars., , , , and . Remote. Sens., 16 (3): 589 (February 2024)Architecture and Realization of Simulator of Video Grid., , , , and . PACIIA (1), page 727-730. IEEE Computer Society, (2008)Deep Reinforcement Learning Based Load Balancing Routing for LEO Satellite Network., , , , , and . VTC Spring, page 1-6. IEEE, (2022)Vision-Based Real-Time Lane Marking Detection and Tracking., , , , and . ITSC, page 49-54. IEEE, (2008)An Evaluation of the Dynamics of Diluted Neural Network., , , , , and . Int. J. Comput. Intell. Syst., 9 (6): 1191-1199 (2016)A Framework of Attacker Centric Cyber Attack Behavior Analysis., and . ICC, page 1449-1454. IEEE, (2007)