Author of the publication

A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders.

, , , , , and . Sensors, 23 (10): 4704 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sparse Antenna Array Based Positional Modulation Design With a Low-Complexity Metasurface., , , , , , , , , and . IEEE Access, (2020)Sampling diversity driven exploration with state difference guidance., , , , and . Expert Syst. Appl., (2022)Optimal Power Allocation for Secrecy Fading Channels Under Spectrum-Sharing Constraints, and . CoRR, (2010)Proximal Policy Optimization via Enhanced Exploration Efficiency., , , and . CoRR, (2020)STOP: A Service Oriented Internet Purification Against Link Flooding Attacks., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Numerical investigation on optimal blasting parameters of tunnel face in granite rock., , and . Simul. Model. Pract. Theory, (January 2024)Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing., , , , and . Sensors, 23 (10): 4865 (2023)An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy., , , , and . J. Inf. Sci. Eng., 33 (4): 1007-1023 (2017)A Non-Forced-Write Atomic Commit Protocol for Cluster File Systems., , , , , and . J. Comput. Sci. Technol., 29 (2): 303-315 (2014)Pre-training of gated convolution neural network for remote sensing image super-resolution., , , and . IET Image Process., 15 (5): 1179-1188 (2021)