Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time Cooperative Adaptive Robust Relay Beamforming Based on Kalman Filtering Channel Estimation., , and . IEEE Trans. Wirel. Commun., 18 (12): 5600-5612 (2019)Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message., , , and . IEEE Trans. Inf. Forensics Secur., 11 (6): 1239-1251 (2016)Binary Wyner-Ziv code design based on compound LDGM-LDPC structures., , and . IET Commun., 12 (4): 375-383 (2018)Successive Wyner-Ziv Coding for the Binary CEO Problem under Logarithmic Loss., , , , and . CoRR, (2018)A tiny public key scheme based on Niederreiter Cryptosystem., , and . CoRR, (2023)Bidirectional AF Relaying With Underlay Spectrum Sharing in Cognitive Radio Networks., , , and . IEEE Trans. Vehicular Technology, 66 (3): 2367-2381 (2017)Multiple Access Wire-tap Channel with Common Message., , , and . CoRR, (2014)A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings., , and . IACR Cryptology ePrint Archive, (2012)Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol., , and . IACR Cryptology ePrint Archive, (2011)A provably secure and efficient authentication scheme for access control in mobile pay-TV systems., and . Multimedia Tools Appl., 75 (1): 405-424 (2016)