Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism., , , , , , and . CoRR, (2022)Data Augmentation and Dense-LSTM for Human Activity Recognition Using WiFi Signal., , , , , , and . IEEE Internet Things J., 8 (6): 4628-4641 (2021)LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)., , , , , and . Comput. Secur., (2021)Zero Trust Architecture (ZTA): A Comprehensive Survey., , , , , and . IEEE Access, (2022)Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Wi-Sign: Device-free Second Factor User Authentication., and . MobiQuitous, page 135-144. ACM, (2018)VID: Human identification through vein patterns captured from commodity depth cameras., , , and . IET Biom., 10 (2): 142-162 (2021)Smart user identification using cardiopulmonary activity., and . Pervasive Mob. Comput., (2019)Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication., , , , , and . TrustCom, page 1119-1126. IEEE, (2020)Recent Trends in User Authentication - A Survey., and . IEEE Access, (2019)