Author of the publication

Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem.

, , , and . Int. J. Netw. Secur., 17 (4): 413-422 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System, , and . CoRR, (2012)Weaknesses in Two RFID Authentication Protocols., , , and . C2SI, volume 9084 of Lecture Notes in Computer Science, page 162-172. Springer, (2015)Energy efficient with time synchronised and service coverage guarantee in wireless sensor networks., , and . Int. J. Commun. Networks Distributed Syst., 21 (1): 56-79 (2018)A Scalable Proof Methodology for RISC Processor Designs: A Functional Approach., and . ITNG, page 241-246. IEEE Computer Society, (2008)BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks., , , , and . CSR, page 148-153. IEEE, (2023)Android Malware Detection using Convolutional Deep Neural Networks., and . ICAASE, page 1-7. IEEE, (2020)Comparative analysis of hierarchical cluster protocols for wireless sensor networks., , and . Int. J. High Perform. Comput. Netw., 13 (4): 366-377 (2019)On Designing a Systolic Network for the Resolution of Linear Systems Using the " Gauss-Seidel " Method., , and . AICCSA, page 283-286. IEEE Computer Society, (2001)Pruned improved eight-point approximate DCT for image encoding in visual sensor networks requiring only ten additions., , , and . J. Real Time Image Process., 17 (5): 1597-1608 (2020)Analysis of hybrid router-assisted reliable multicast protocols in lossy networks., , and . Int. Arab J. Inf. Technol., 14 (1): 26-34 (2017)