Author of the publication

Weaknesses of a dynamic ID-based remote user authentication scheme.

, , and . Int. J. Electron. Secur. Digit. Forensics, 3 (4): 355-362 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generalized Doubly Robust Learning Framework for Debiasing Post-Click Conversion Rate Prediction., , , , , , , and . KDD, page 252-262. ACM, (2022)Analysis of Human Factor in Air Traffic Control Unsafe Events Based on Improved DECIDE Model., , , and . HCI (5), volume 12185 of Lecture Notes in Computer Science, page 365-374. Springer, (2020)Efficacy of statin treatment based on cardiovascular outcomes in elderly patients: a standard meta-analysis and Bayesian network analysis, , , , , , , , and . 48 (6): 030006052092634 (2020)Scene categorization based on heterogeneous features., , , and . VCIP, volume 7744 of SPIE Proceedings, page 77441U. SPIE, (2010)Optimal constrained ensemble control for inhomogeneous robots., , , , , and . ACC, page 6265-6271. IEEE, (2016)Direct Torque Controlling of Permanent Magnet Synchronous Motor Based on the Adaptive Fuzzy Controller., , and . ICFIE, volume 62 of Advances in Intelligent and Soft Computing, page 393-401. (2009)3D Trajectory Design for UAV-Enabled Data Harvesting in Probabilistic LoS Channel., , and . GLOBECOM, page 1-6. IEEE, (2019)Fine-grained access control system based on fully outsourced attribute-based encryption., , and . J. Syst. Softw., (2017)A Learning-Based Two-Stage Spectrum Sharing Strategy With Multiple Primary Transmit Power Levels., , , , and . IEEE Trans. Signal Process., 67 (18): 4899-4914 (2019)Secrecy Wireless Information and Power Transfer With MISO Beamforming., , and . IEEE Trans. Signal Process., 62 (7): 1850-1863 (2014)