Author of the publication

Lightweight RFID Mutual Authentication Protocol against Feasible Problems.

, , , , and . ICICS, volume 7043 of Lecture Notes in Computer Science, page 69-77. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Normal Information Diffusion Distribution and Its Application in Inferring the Optimal Probability Density Functions of the Event Coordinates From the Microseismic or Acoustic Emission Sources., , and . IEEE Access, (2020)Heavy-Tailed Workload Aware Ad Hoc Routing., , , , and . ICC, page 2437-2442. IEEE, (2008)Research on risk management of commercial Banks under financial innovation based on fixed effects model., and . ICIIP, page 223-227. ACM, (2023)Experimental Investigation on the Influence of Depth on Rockburst Characteristics in Circular Tunnels., , and . Sensors, 22 (10): 3679 (2022)Modeling Networking Protocols to Test Intrusion Detection Systems., and . LCN, page 774-775. IEEE Computer Society, (2004)A Variant of Boyen-Waters Anonymous IBE Scheme., , , , , and . ICICS, volume 7043 of Lecture Notes in Computer Science, page 42-56. Springer, (2011)A New Leakage-Resilient IBE Scheme in the Relative Leakage Model., , and . DBSec, volume 6818 of Lecture Notes in Computer Science, page 263-270. Springer, (2011)Two-Message Key Exchange with Strong Security from Ideal Lattices., , and . CT-RSA, volume 10808 of Lecture Notes in Computer Science, page 98-115. Springer, (2018)A new strong security model for stateful authenticated group key exchange., , , , and . Int. J. Inf. Sec., 17 (4): 423-440 (2018)Micro-Expression Recognition Based on Pixel Residual Sum and Cropped Gaussian Pyramid., , and . Frontiers Neurorobotics, (2021)