Author of the publication

An information real-time synchronisation system across different media based on position encoding for mobile computing.

, , , , and . Int. J. Comput. Appl. Technol., 65 (1): 45-54 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Quadratic Residue-Based Lightweight RFID Mutual Authentication Protocol with Constant-Time Identification.. J. Commun., 10 (2): 117-123 (2015)Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network., and . KSII Trans. Internet Inf. Syst., 14 (4): 1773-1795 (2020)Secure outsourcing of modular inverses and scalar multiplications on elliptic curves., , , and . Int. J. Secur. Networks, 15 (2): 101-110 (2020)Distance Bounding Protocol for RFID Systems., and . WASA, volume 9798 of Lecture Notes in Computer Science, page 241-249. Springer, (2016)Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System., and . KSII Trans. Internet Inf. Syst., 13 (12): 6243-6259 (2019)An information real-time synchronisation system across different media based on position encoding for mobile computing., , , , and . Int. J. Comput. Appl. Technol., 65 (1): 45-54 (2021)PKCHD: Towards a Probabilistic Knapsack Public-Key Cryptosystem with High Density., , , , and . Information, 10 (2): 75 (2019)Practical NTRU Signcryption in the Standard Model., , , , , and . Entropy, 25 (12): 1651 (December 2023)Security Protocol for RFID System Conforming to EPC-C1G2 Standard., , , , and . J. Comput., 8 (3): 605-612 (2013)A Novel Phishing Website Detection Model Based on LightGBM and Domain Name Features., , , , and . Symmetry, 15 (1): 180 (2023)