Author of the publication

Primitive polynomials for robust scramblers and stream ciphers against reverse engineering.

, , and . ISIT, page 2473-2477. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing the Internet of Everything through Adaptive and Resource-Efficient Mechanisms., and . IEEE Internet Things Mag., 3 (4): 16-19 (2020)Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks., , and . LCN Workshops, page 1001-1009. IEEE Computer Society, (2013)On the Field Level Loss of a VHT PPDU in a MIMO-OFDM System for a WiFi Direct 802.11ac WLAN., , , and . FIT, page 164-169. IEEE Computer Society, (2016)Information-theoretically secure key generation and management., and . ISIT, page 1529-1533. IEEE, (2017)Investigation on Scrambler Reconstruction with Minimum A Priori Knowledge., , , and . GLOBECOM, page 1-5. IEEE, (2011)A Novel Framework for Software Defined Wireless Body Area Network., , , and . CoRR, (2019)Coordinates and Bearing of Submerged Sensors Using a Single Mobile Beacon (CSMB)., , and . J. Networks, 10 (8): 462-469 (2015)New code equivalence based on relative generalized Hamming weights., , , and . Inf. Sci., 181 (19): 4309-4317 (2011)Near-Optimal Collusion-Secure Fingerprinting Codes for Efficiently Tracing Illegal Re-distribution., and . CSS, volume 7672 of Lecture Notes in Computer Science, page 352-361. Springer, (2012)Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic., , and . IEEE Trans. Consumer Electron., 61 (2): 197-205 (2015)