Author of the publication

Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks.

, , , , , , , , and . KSII Trans. Internet Inf. Syst., 12 (7): 3421-3437 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Embedded Model XG-FwFMs for Click-Through Rate., , , and . ICBDC, page 179-184. ACM, (2019)Searchable encryption algorithm based on key aggregation of multiple data owners in data sharing., , , , , and . J. Inf. Secur. Appl., (November 2023)Research on Consumer Credit Portrait Intelligent Scoring Model., , and . ASSE, page 46-51. ACM, (2020)Ca-Mt: A Self-Ensembling Model for Semi-Supervised Cardiac Segmentation with Elliptical Descriptor Based Contour-Aware., , , , , and . ISBI, page 1-5. IEEE, (2022)Rating Matrix Prefilling Algorithm Based on Users' Social Strength., and . ES, page 214-217. IEEE, (2014)Time-aware Attentive Click Sequence Network for Click-Through Rate Prediction., , , and . BDE, page 134-139. ACM, (2022)Multi-interest Network Based on Double Attention for Click-Through Rate Prediction., , and . APWeb/WAIM (2), volume 12859 of Lecture Notes in Computer Science, page 310-322. Springer, (2021)An Optimized Full-Text Retrieval System Based on Lucene in Oracle Database., and . ES, page 61-65. IEEE, (2014)Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks., , , , , , , , and . KSII Trans. Internet Inf. Syst., 12 (7): 3421-3437 (2018)A novel Swin Transformer based on height class distribution and feature alignment for clothing parsing., , , , and . RICAI, page 722-727. ACM, (2022)