Author of the publication

Some Methods for Privacy in RFID Communication.

, , and . ESAS, volume 3313 of Lecture Notes in Computer Science, page 42-53. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unobtrusive long-range detection of passive RFID tag motion., , , and . IEEE Trans. Instrumentation and Measurement, 55 (1): 187-196 (2006)Web Mining For Financial Market Prediction Based On Online Sentiments., , , and . PACIS, page 43. (2012)Development of an Intelligent Data-Mining System for a Dispersed Manufacturing Network., , , and . Expert Syst. J. Knowl. Eng., 18 (4): 175-185 (2001)Performance evaluation of deep bottleneck features for spoken language identification., , , , , and . ISCSLP, page 143-147. IEEE, (2014)Exemplar-Based Sparse Representation for Language Recognition on I-Vectors., , , and . INTERSPEECH, page 2057-2060. ISCA, (2012)Deep bottleneck network based i-vector representation for language identification., , , , , and . INTERSPEECH, page 398-402. ISCA, (2015)Exemplar based language recognition method for short-duration speech segments., , , , and . ICASSP, page 7354-7358. IEEE, (2013)Environmental impact assessment of life-cycle building products using the evidence reasoning approach., , and . Int. J. Netw. Virtual Organisations, 10 (3/4): 319-333 (2012)Research on marine environmental data management in China digital ocean prototype system., , , , and . IGARSS, page 2318-2321. IEEE, (2010)Service-based distributed data management and application in China Digital Ocean., , and . IGARSS, page 425-428. IEEE, (2010)