Author of the publication

RFID Authentication Protocols Based on Error-Correcting Codes: A Survey.

, , , and . Wireless Personal Communications, 96 (1): 509-527 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weaknesses in Two RFID Authentication Protocols., , , and . C2SI, volume 9084 of Lecture Notes in Computer Science, page 162-172. Springer, (2015)An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System, , and . CoRR, (2012)Energy efficient with time synchronised and service coverage guarantee in wireless sensor networks., , and . Int. J. Commun. Networks Distributed Syst., 21 (1): 56-79 (2018)BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks., , , , and . CSR, page 148-153. IEEE, (2023)Android Malware Detection using Convolutional Deep Neural Networks., and . ICAASE, page 1-7. IEEE, (2020)A Scalable Proof Methodology for RISC Processor Designs: A Functional Approach., and . ITNG, page 241-246. IEEE Computer Society, (2008)On Designing a Systolic Network for the Resolution of Linear Systems Using the " Gauss-Seidel " Method., , and . AICCSA, page 283-286. IEEE Computer Society, (2001)Comparative analysis of hierarchical cluster protocols for wireless sensor networks., , and . Int. J. High Perform. Comput. Netw., 13 (4): 366-377 (2019)Pruned improved eight-point approximate DCT for image encoding in visual sensor networks requiring only ten additions., , , and . J. Real Time Image Process., 17 (5): 1597-1608 (2020)Analysis of hybrid router-assisted reliable multicast protocols in lossy networks., , and . Int. Arab J. Inf. Technol., 14 (1): 26-34 (2017)