Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ABSTRACT: Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization., , , , , and . CCSW, page 165. ACM, (2020)Construction of efficient and secure pairing algorithm and its application., , and . J. Commun. Networks, 10 (4): 437-443 (2008)Low-Power Encryption Algorithm Block Cipher in JavaScript., and . J. Inform. and Commun. Convergence Engineering, 12 (4): 252-256 (2014)Construction of Efficient and Secure Pairing Algorithm and its Application., , and . IACR Cryptol. ePrint Arch., (2007)AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling., , and . WISA, volume 13009 of Lecture Notes in Computer Science, page 157-168. Springer, (2021)Efficient Exponentiation in GF(pm) Using the Frobenius Map., , , and . ICCSA (4), volume 3983 of Lecture Notes in Computer Science, page 584-593. Springer, (2006)Open Location-Based Service Using Secure Middleware Infrastructure in Web Services., , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 1146-1155. Springer, (2005)Parallel Implementations of CHAM., , , , , and . WISA, volume 11402 of Lecture Notes in Computer Science, page 93-104. Springer, (2018)ARM/NEON Co-design of Multiplication/Squaring., , , , and . WISA, volume 10763 of Lecture Notes in Computer Science, page 72-84. Springer, (2017)An enhanced LBS security protocol in wireless networks., , , and . IGARSS, page 1594-1597. IEEE, (2005)