Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RNA-seq coverage effects on biological pathways and GO tag clouds., , , , and . ISB, page 240-245. IEEE, (2012)Length Encoded Secondary Structure Profile for Remote Homologous Protein Detection., , , , , and . ICA3PP, volume 5574 of Lecture Notes in Computer Science, page 1-11. Springer, (2009)A New Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol., , , and . J. Inf. Hiding Multim. Signal Process., 9 (6): 1595-1602 (2018)Comments on Recent Proposed Cui Et Al.'s KASE and Lu Et Al.'s dIBEKS Schemes., , , , and . J. Inf. Hiding Multim. Signal Process., 9 (1): 162-169 (2018)Security Analysis and Improvement of An Image Encryption Scheme Based on Chaotic Tent Map., , , , , and . J. Inf. Hiding Multim. Signal Process., 9 (4): 1050-1057 (2018)A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)., , , , , and . J. Inf. Secur. Appl., (2021)3DVPS: A 3D Point Cloud-Based Visual Positioning System., , , and . ICCE, page 1-4. IEEE, (2020)A novel fuzzy logic system based on N-version programming., and . IEEE Trans. Fuzzy Syst., 8 (2): 155-170 (2000)A secure authentication scheme for Internet of Things., , , and . Pervasive Mob. Comput., (2017)A Secure Authentication Protocol for Internet of Vehicles., , , and . IEEE Access, (2019)