Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Anonymous Asymmetric Public Key Traitor Tracing Scheme., , and . EC-Web, volume 2738 of Lecture Notes in Computer Science, page 104-114. Springer, (2003)Information and communication technology use in older adults: A unidirectional or Bi-directional association with cognitive function?, , and . Comput. Hum. Behav., (2021)Trapdoor-based Mutual Authentication Scheme without Cryptographic Primitives in RFID Tags., , , and . SECPerU, page 73-78. IEEE Computer Society, (2007)Convergence of prefrontal and parietal anatomical projections in a connectional hub in the striatum., , , , and . NeuroImage, (2017)Nanotechnology for Early Cancer Detection., , and . Sensors, 10 (1): 428-455 (2010)Automated integrated system for stained neuron detection: An end-to-end framework with a high negative predictive rate., , , and . Comput. Methods Programs Biomed., (2019)Two-stage Neural-network based Prognosis Models using Pathological Image and Transcriptomic Data: An Application in Hepatocellular Carcinoma Patient Survival Prediction., , , , , , and . BIOINFORMATICS, page 296-301. SCITEPRESS, (2020)An Exploratory Study on the Framework for Ubiquitous Sensor Network., , , , and . ALPIT, page 352-357. IEEE Computer Society, (2007)Efficient RFID Authentication Protocol for Ubiquitous Computing Environment., , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 945-954. Springer, (2005)Evidence for a Functional Hierarchy of Association Networks., , and . J. Cognitive Neuroscience, (2018)