Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear complexity of pseudo random binary sequence generated by trace function and Legendre symbol over proper sub extension field., , , , , and . IWSDA, page 84-88. IEEE, (2017)A pseudo-random binary sequence generated by using primitive polynomial of degree 2 over odd characteristic field Fp., and . ICCE-TW, page 1-2. IEEE, (2016)Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System., , , , , and . ICCE-Taiwan, page 285-286. IEEE, (2023)A new approach for generating well balanced Pseudo-random signed binary sequence over odd characteristic field., , , , , , and . ISITA, page 777-780. IEEE, (2016)An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology., , , , , and . CANDARW, page 260-266. IEEE, (2023)A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application., , , , , and . CANDARW, page 195-201. IEEE, (2023)Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension Field., , , , , and . ICIT, page 92-96. ACM, (2018)A modified M-sequence with dynamic mapping and its autocorrelation., , , , , and . ICCE-Taiwan, page 347-348. IEEE, (2023)Auto and Cross Correlation of Well Balanced Sequence over Odd Characteristic Field., , , and . CANDAR, page 604-609. IEEE Computer Society, (2016)An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption., , , , , and . CANDARW, page 220-226. IEEE, (2023)